LAAEB: A comprehensive log-text analysis based approach for insider threat detection

被引:0
作者
Fei, Kexiong [1 ,2 ,3 ]
Zhou, Jiang [1 ,2 ,3 ]
Zhou, Yucan [1 ,2 ,3 ]
Gu, Xiaoyan [1 ,2 ,3 ]
Fan, Haihui [1 ,2 ,3 ]
Li, Bo [1 ,2 ,3 ]
Wang, Weiping [1 ]
Chen, Yong [4 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[3] Key Lab Cyberspace Secur Def, Beijing, Peoples R China
[4] Texas Tech Univ, Dept Comp Sci, Lubbock, TX USA
基金
中国国家自然科学基金;
关键词
Insider threat detection; Log analysis; Anomaly detection; Cyber security; User behavior analysis;
D O I
10.1016/j.cose.2024.104126
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Insider threats have increasingly become a critical issue that modern enterprises and organizations faced. They are mainly initiated by insider attackers, which may cause disastrous impacts. Numerous research studies have been conducted for insider threat detection. However, most of them are limited due to a small number of malicious samples. Moreover, as existing methods often concentrate on feature information or statistical characteristics for anomaly detection, they still lack effective use of comprehensive textual content information contained in logs and thus will affect detection efficiency. We propose LaAeb, a novel unsupervised insider threat detection framework that leverages rich linguistic information in log contents to enable conventional methods, such as an Isolation Forest-based anomaly detection, to better detect insider threats besides using various features and statistical information. To find malicious acts under different scenarios, we consider three patterns of insider threats, including attention, emotion, and behavior anomaly. The attention anomaly detection analyzes textual contents of operation objects (e.g., emails and web pages) in logs to detect threats, where the textual information reflects the areas that employees focus on. When the attention seriously deviates from daily work, an employee may involve malicious acts. The emotion anomaly detection analyzes all dialogs between every two employees' daily communicated texts and uses the degree of negative to find potential psychological problems. The behavior anomaly detection analyzes the operations of logs to detect threats. It utilizes information acquired from attention and emotion anomalies as ancillary features, integrating them with features and statistics extracted from log operations to create log embeddings. With these log embeddings, LaAeb employs anomaly detection algorithm like Isolation Forest to analyze an employee's malicious operations, and further detects the employee's behavior anomaly by considering all employees' acts in the same department. Finally, LaAeb consolidates detection results of three patterns indicative of insider threats in a comprehensive manner. We implement the prototype of LaAeb and test it on CERT and LANL datasets. Our evaluations demonstrate that compared with state-of-the-art unsupervised methods, LaAeb reduces FPR by 50% to reach 0.05 on CERT dataset under the same AUC (0.93), and gets the best AUC (0.97) with 0.06 higher value on LANL dataset.
引用
收藏
页数:17
相关论文
共 82 条
[61]  
Sun F.-Y., 2019, arXiv
[62]  
Sun Y, 2021, Arxiv, DOI [arXiv:2107.02137, 10.48550/arXiv. 2107.02137, DOI 10.48550/ARXIV.2107.02137]
[63]   A parallel algorithm for network traffic anomaly detection based on Isolation Forest [J].
Tao, Xiaoling ;
Peng, Yang ;
Zhao, Feng ;
Zhao, Peichao ;
Wang, Yong .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2018, 14 (11)
[64]   Detecting Insider Threats Through Language Change [J].
Taylor, Paul J. ;
Dando, Coral J. ;
Ormerod, Thomas C. ;
Ball, Linden J. ;
Jenkins, Marisa C. ;
Sandham, Alexandra ;
Menacere, Tarek .
LAW AND HUMAN BEHAVIOR, 2013, 37 (04) :267-275
[65]  
The Verizon Company, 2023, Technical Report
[66]   Wrongdoing Monitor: A Graph-Based Behavioral Anomaly Detection in Cyber Security [J].
Wang, Cheng ;
Zhu, Hangyu .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 :2703-2718
[67]   Intrusion Detection Using Few-shot Learning Based on Triplet Graph Convolutional Network [J].
Wang, Yue ;
Jiang, Yiming ;
Lan, Julong .
JOURNAL OF WEB ENGINEERING, 2021, 20 (05) :1527-1552
[68]   LogGAN: A Sequence-Based Generative Adversarial Network for Anomaly Detection Based on System Logs [J].
Xia, Bin ;
Yin, Junjie ;
Xu, Jian ;
Li, Yun .
SCIENCE OF CYBER SECURITY, SCISEC 2019, 2019, 11933 :61-76
[69]  
Xu CY, 2020, Arxiv, DOI arXiv:2001.06137
[70]  
Xu KYL, 2018, PR MACH LEARN RES, V80