LAAEB: A comprehensive log-text analysis based approach for insider threat detection

被引:0
作者
Fei, Kexiong [1 ,2 ,3 ]
Zhou, Jiang [1 ,2 ,3 ]
Zhou, Yucan [1 ,2 ,3 ]
Gu, Xiaoyan [1 ,2 ,3 ]
Fan, Haihui [1 ,2 ,3 ]
Li, Bo [1 ,2 ,3 ]
Wang, Weiping [1 ]
Chen, Yong [4 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[3] Key Lab Cyberspace Secur Def, Beijing, Peoples R China
[4] Texas Tech Univ, Dept Comp Sci, Lubbock, TX USA
基金
中国国家自然科学基金;
关键词
Insider threat detection; Log analysis; Anomaly detection; Cyber security; User behavior analysis;
D O I
10.1016/j.cose.2024.104126
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Insider threats have increasingly become a critical issue that modern enterprises and organizations faced. They are mainly initiated by insider attackers, which may cause disastrous impacts. Numerous research studies have been conducted for insider threat detection. However, most of them are limited due to a small number of malicious samples. Moreover, as existing methods often concentrate on feature information or statistical characteristics for anomaly detection, they still lack effective use of comprehensive textual content information contained in logs and thus will affect detection efficiency. We propose LaAeb, a novel unsupervised insider threat detection framework that leverages rich linguistic information in log contents to enable conventional methods, such as an Isolation Forest-based anomaly detection, to better detect insider threats besides using various features and statistical information. To find malicious acts under different scenarios, we consider three patterns of insider threats, including attention, emotion, and behavior anomaly. The attention anomaly detection analyzes textual contents of operation objects (e.g., emails and web pages) in logs to detect threats, where the textual information reflects the areas that employees focus on. When the attention seriously deviates from daily work, an employee may involve malicious acts. The emotion anomaly detection analyzes all dialogs between every two employees' daily communicated texts and uses the degree of negative to find potential psychological problems. The behavior anomaly detection analyzes the operations of logs to detect threats. It utilizes information acquired from attention and emotion anomalies as ancillary features, integrating them with features and statistics extracted from log operations to create log embeddings. With these log embeddings, LaAeb employs anomaly detection algorithm like Isolation Forest to analyze an employee's malicious operations, and further detects the employee's behavior anomaly by considering all employees' acts in the same department. Finally, LaAeb consolidates detection results of three patterns indicative of insider threats in a comprehensive manner. We implement the prototype of LaAeb and test it on CERT and LANL datasets. Our evaluations demonstrate that compared with state-of-the-art unsupervised methods, LaAeb reduces FPR by 50% to reach 0.05 on CERT dataset under the same AUC (0.93), and gets the best AUC (0.97) with 0.06 higher value on LANL dataset.
引用
收藏
页数:17
相关论文
共 82 条
[1]   Vector based sentiment and emotion analysis from text: A survey [J].
Aka Uymaz, Hande ;
Kumova Metin, Senem .
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2022, 113
[2]   Enhancing false negative and positive rates for efficient insider threat detection [J].
AlSlaiman, Muhanned ;
Salman, Mohammed I. ;
Saleh, Mariam M. ;
Wang, Bin .
COMPUTERS & SECURITY, 2023, 126
[3]   A Review of Recent Advances, Challenges, and Opportunities in Malicious Insider Threat Detection Using Machine Learning Methods [J].
Alzaabi, Fatima Rashed ;
Mehmood, Abid .
IEEE ACCESS, 2024, 12 :30907-30927
[4]   Threat Alert Prioritization Using Isolation Forest and Stacked Auto Encoder With Day-Forward-Chaining Analysis [J].
Aminanto, Muhamad Erza ;
Ban, Tao ;
Isawa, Ryoichi ;
Takahashi, Takeshi ;
Inoue, Daisuke .
IEEE ACCESS, 2020, 8 (08) :217977-217986
[5]  
Arthur D, 2007, PROCEEDINGS OF THE EIGHTEENTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, P1027
[6]  
Bowman B., 2020, 23 INT S RES ATT INT, P257
[7]   Predicting Insider Threat Risks through Linguistic Analysis of Electronic Communication [J].
Brown, Christopher R. ;
Watkins, Alison ;
Greitzer, Frank L. .
PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, :1849-1858
[8]  
Brown TB, 2020, ADV NEUR IN, V33
[9]  
Cappelli D.M., 2012, The CERT guide to insider threats: how to prevent, detect, and respond to information technology crimes
[10]  
Chen M, 2020, PR MACH LEARN RES, V119