User Behavior Threat Detection Based on Adaptive Sliding Window GAN

被引:1
作者
Tao, Xiaoling [1 ]
Lu, Shen [1 ]
Zhao, Feng [2 ]
Lan, Rushi [1 ]
Chen, Longsheng [1 ]
Fu, Lianyou [1 ]
Jia, Ruchun [3 ]
机构
[1] Guilin Univ Elect Technol, Sch Comp Sci & Informat Secur, Guilin 541004, Peoples R China
[2] Guilin Univ Elect Technol, Sch Informat & Commun, Guilin 541004, Peoples R China
[3] Sichuan Univ, Sch Comp, Wangjiang Campus, Chengdu 610065, Peoples R China
来源
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT | 2024年 / 21卷 / 02期
基金
中国国家自然科学基金;
关键词
User behavior; threat detection; adaptive sliding window; GAN; INSIDER THREAT; INTRUSION;
D O I
10.1109/TNSM.2024.3355698
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
User behavior threat detection is important for the protection of network system security. Traditional supervised modeling methods and unbalanced sample data lead to a high false positive rate in user behavior detection. In addition, network user behaviors are complex, changeable, and difficult to predict, and existing detection methods are facing ever greater challenges. Effectively detecting user behavior remains a challenge. In this paper, we propose a user behavior threat detection method based on an Adaptive Sliding Window Generative Adversarial Network (ASW-GAN). This method designs an adaptive sliding window mechanism to process behavior data and uses the GAN model to detect threat behavior, finally uses the maximum interclass variance algorithm Otsu to optimize test detection result. Compared with other typical methods, the proposed method achieves a higher accuracy rate and a markedly lower false positive rate, and can effectively evaluate user threat behaviors.
引用
收藏
页码:2493 / 2503
页数:11
相关论文
共 55 条
  • [1] Insider-threat detection using Gaussian Mixture Models and Sensitivity Profiles
    Al Tabash, Kholood
    Happa, Jassim
    [J]. COMPUTERS & SECURITY, 2018, 77 : 838 - 859
  • [2] Al-Anzi FS, 2017, J KING SAUD UNIV-COM, V29, P189, DOI 10.1016/j.jksuci.2016.04.001
  • [3] [Anonymous], 2020, 2020 insider threat report
  • [4] [Anonymous], 2020, Data breach investigations report
  • [5] Behavioral Analysis of Insider Threat: A Survey and Bootstrapped Prediction in Imbalanced Data
    Azaria, Amos
    Richardson, Ariella
    Kraus, Sarit
    Subrahmanian, V. S.
    [J]. IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2014, 1 (02): : 135 - 155
  • [6] Network Anomaly Detection: Methods, Systems and Tools
    Bhuyan, Monowar H.
    Bhattacharyya, D. K.
    Kalita, J. K.
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01): : 303 - 336
  • [7] A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
    Buczak, Anna L.
    Guven, Erhan
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02): : 1153 - 1176
  • [8] Scenario-Based Insider Threat Detection From Cyber Activities
    Chattopadhyay, Pratik
    Wang, Lipo
    Tan, Yap-Peng
    [J]. IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2018, 5 (03): : 660 - 675
  • [9] Chen LW, 2006, LECT NOTES COMPUT SC, V4064, P37
  • [10] Collins M. L.., 2016, Technical report CMU/SEI-2015-TR-010, Vfifth