User Behavior Threat Detection Based on Adaptive Sliding Window GAN

被引:1
作者
Tao, Xiaoling [1 ]
Lu, Shen [1 ]
Zhao, Feng [2 ]
Lan, Rushi [1 ]
Chen, Longsheng [1 ]
Fu, Lianyou [1 ]
Jia, Ruchun [3 ]
机构
[1] Guilin Univ Elect Technol, Sch Comp Sci & Informat Secur, Guilin 541004, Peoples R China
[2] Guilin Univ Elect Technol, Sch Informat & Commun, Guilin 541004, Peoples R China
[3] Sichuan Univ, Sch Comp, Wangjiang Campus, Chengdu 610065, Peoples R China
来源
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT | 2024年 / 21卷 / 02期
基金
中国国家自然科学基金;
关键词
User behavior; threat detection; adaptive sliding window; GAN; INSIDER THREAT; INTRUSION;
D O I
10.1109/TNSM.2024.3355698
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
User behavior threat detection is important for the protection of network system security. Traditional supervised modeling methods and unbalanced sample data lead to a high false positive rate in user behavior detection. In addition, network user behaviors are complex, changeable, and difficult to predict, and existing detection methods are facing ever greater challenges. Effectively detecting user behavior remains a challenge. In this paper, we propose a user behavior threat detection method based on an Adaptive Sliding Window Generative Adversarial Network (ASW-GAN). This method designs an adaptive sliding window mechanism to process behavior data and uses the GAN model to detect threat behavior, finally uses the maximum interclass variance algorithm Otsu to optimize test detection result. Compared with other typical methods, the proposed method achieves a higher accuracy rate and a markedly lower false positive rate, and can effectively evaluate user threat behaviors.
引用
收藏
页码:2493 / 2503
页数:11
相关论文
共 55 条
  • [42] Senator TE, 2013, 19TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING (KDD'13), P1393
  • [43] User Behavior Profiling using Ensemble Approach for Insider Threat Detection
    Singh, Malvika
    Mehtre, B. M.
    Sangeetha, S.
    [J]. 2019 5TH IEEE INTERNATIONAL CONFERENCE ON IDENTITY, SECURITY, AND BEHAVIOR ANALYSIS (ISBA 2019), 2019,
  • [44] Tuor A., 2018, PROC WORKSHOPS 31 AA, P39
  • [45] Weiyu He, 2021, 2021 IEEE Sixth International Conference on Data Science in Cyberspace (DSC), P564, DOI 10.1109/DSC53577.2021.00089
  • [46] Xiaolei Deng, 2021, 2021 IEEE 5th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), P748, DOI 10.1109/ITNEC52019.2021.9587030
  • [47] Feature Engineering Method Using Double-Layer Hidden Markov Model for Insider Threat Detection
    Ye, Xiaoyun
    Hong, Sung-Sam
    Han, Myung-Mook
    [J]. INTERNATIONAL JOURNAL OF FUZZY LOGIC AND INTELLIGENT SYSTEMS, 2020, 20 (01) : 17 - 25
  • [48] Data Augmentation for Insider Threat Detection with GAN
    Yuan, Fangfang
    Shang, Yanmin
    Liu, Yanbing
    Cao, Yanan
    Tan, Jianlong
    [J]. 2020 IEEE 32ND INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI), 2020, : 632 - 638
  • [49] Insider Threat Detection with Deep Neural Network
    Yuan, Fangfang
    Cao, Yanan
    Shang, Yanmin
    Liu, Yanbing
    Tan, Jianlong
    Fang, Binxing
    [J]. COMPUTATIONAL SCIENCE - ICCS 2018, PT I, 2018, 10860 : 43 - 54
  • [50] Kernelized support vector machine with deep learning: An efficient approach for extreme multiclass dataset
    Zareapoor, Masoumeh
    Shamsolmoali, Pourya
    Jain, Deepak Kumar
    Wanx, Haoxiang
    Yang, Jie
    [J]. PATTERN RECOGNITION LETTERS, 2018, 115 : 4 - 13