GMFITD: Graph Meta-Learning for Effective Few-Shot Insider Threat Detection

被引:1
作者
Li, Ximing [1 ]
Li, Linghui [1 ]
Li, Xiaoyong [1 ]
Cai, Binsi [1 ]
Jia, Jia [1 ]
Gao, Yali [1 ]
Yu, Shui [2 ]
机构
[1] Beijing Univ Posts & Telecommun, Key Lab Trustworthy Distributed Comp & Serv, Minist Educ, Beijing 100876, Peoples R China
[2] Univ Technol Sydney, Sch Comp Sci, Ultimo, NSW 2007, Australia
基金
中国国家自然科学基金;
关键词
Threat assessment; Metalearning; Few shot learning; Image edge detection; Task analysis; Feature extraction; Data models; Insider threat; graph neural network; meta-learning; NETWORKS;
D O I
10.1109/TIFS.2024.3430106
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Insider threats represent a significant challenge in both corporate and governmental sectors. Most existing supervised learning based detection methods that rely on transforming user behavior into sequential data do not fully utilize structural information and require extensive labeled data. This reliance poses a challenge due to the scarcity of labeled data in real-world scenarios, leading to a few-shot learning situation. To address these limitations, we propose a novel Graph modularized-based Meta-learning Framework for Insider Threat Detection, named GMFITD. Specifically, GMFITD utilizes a structural reconstruction mechanism that combines a graph-based autoencoder with an attention mechanism to explore structural information and infer potential relationships between users. Additionally, we employ a graph prototype construction method coupling episodic meta-learning principle (MAML) to compute representative embeddings for few-shot learning scenarios. By leveraging MAML, the proposed method can capture prior knowledge of insider threat classification by training on similar few-shot learning tasks with few labeled samples. We further enhance the resilience of GMFITD to adversarial attacks through an edge importance estimation mechanism, which assigns higher weights to relevant edges. Extensive experiments demonstrate that our proposed GMFITD outperforms state-of-the-art methods in insider threat detection, achieving higher accuracy with fewer labeled samples and resisting adversarial attacks.
引用
收藏
页码:7161 / 7175
页数:15
相关论文
共 57 条
  • [1] TOPOLOGICAL ADVERSARIAL ATTACKS ON GRAPH NEURAL NETWORKS VIA PROJECTED META LEARNING
    Aburidi, Mohammed
    Marcia, Roummel
    [J]. IEEE CONFERENCE ON EVOLVING AND ADAPTIVE INTELLIGENT SYSTEMS 2024, IEEE EAIS 2024, 2024, : 330 - 337
  • [2] Al-Mhiqani M.N., 2020, Indonesian Journal of Electrical Engineering and Computer Science, V17, P1474, DOI [DOI 10.11591/IJEECS.V17.I3.PP1474-1479, 10.11591/ijeecs.v17.i3.pp1474-1479]
  • [3] A new intelligent multilayer framework for insider threat detection
    Al-Mhiqani, Mohammed Nasser
    Ahmad, Rabiah
    Abidin, Z. Zainal
    Abdulkareem, Karrar Hameed
    Mohammed, Mazin Abed
    Gupta, Deepak
    Shankar, K.
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2022, 97
  • [4] Alahmadi Bushra A., 2015, 17th International Conference on Enterprise Information Systems (ICEIS 2015). Proceedings, P709
  • [5] Ba J. L., 2016, arXiv, DOI DOI 10.48550/ARXIV.1607.06450
  • [6] Bojchevski A, 2019, PR MACH LEARN RES, V97
  • [7] LOF: Identifying density-based local outliers
    Breunig, MM
    Kriegel, HP
    Ng, RT
    Sander, J
    [J]. SIGMOD RECORD, 2000, 29 (02) : 93 - 104
  • [8] A convolutional neural-based learning classifier system for detecting database intrusion via insider attack
    Bu, Seok-Jun
    Cho, Sung-Bae
    [J]. INFORMATION SCIENCES, 2020, 512 (512) : 123 - 136
  • [9] Chauhan J., 2020, P ICLR
  • [10] Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System
    Chen, Yuqi
    Poskitt, Christopher M.
    Sun, Jun
    [J]. 2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2018, : 648 - 660