Unveiling shadows: A comprehensive framework for insider threat detection based on statistical and sequential analysis

被引:5
作者
Xiao, Haitao [1 ,2 ]
Zhu, Yan [1 ,2 ]
Zhang, Bin [3 ]
Lu, Zhigang [1 ,2 ]
Du, Dan [1 ,2 ]
Liu, Yuling [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[3] China Cybersecur Review Technol & Certificat Ctr, Beijing, Peoples R China
关键词
Insider threat detection; Statistical analysis; Sequential analysis; Deep learning;
D O I
10.1016/j.cose.2023.103665
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the increasing importance of internal information security, detecting insider threats has become a critical issue to safeguard organizations' information systems. However, most of the previous studies either overlook temporal relationships or have difficulty attaining accurate performance. One of the primary factors contributing to this challenge is their approach, which lacks a holistic perspective. To our knowledge, none of these studies has considered the integration of statistical and sequential information in addressing this issue. Therefore, propose a comprehensive framework for insider threat detection based on statistical and sequential analysis address this challenge. Leveraging the strengths of both statistical analysis and sequential analysis, we deploy an efficient implementation for analyzing and modeling user data based on convolutional attention and transformer encoder, referred to as CATE. First, user behavior logs are consolidated from diverse sources and preprocessed into a suitable format for subsequent analysis. Then, two parallel analysis modules analyze user data in two different dimensions. The analysis modules are entirely constructed using a neural network for high adaptability and efficient integration of information from distinct dimensions. Specifically, a subnetwork structure based on convolutional attention is designed to effectively learn statistical information, while a separate subnetwork structure based on transformers is tailored for learning sequential information. Finally, we perform series of solid experiments utilizing the publicly available CERT dataset to evaluate our framework's effectiveness and robustness in detecting insider threats and identifying malicious scenarios.
引用
收藏
页数:13
相关论文
共 35 条
[1]  
Afzal MZ, 2015, PROC INT CONF DOC, P1111, DOI 10.1109/ICDAR.2015.7333933
[2]   A long short-term memory (LSTM)-based distributed denial of service (DDoS) detection and defense system design in public cloud network environment [J].
Aydin, Hakan ;
Orman, Zeynep ;
Aydin, Muhammed Ali .
COMPUTERS & SECURITY, 2022, 118
[3]  
Ba JimmyLei., 2016, CORR
[4]   Anomaly Detection for Insider Threats: An Objective Comparison of Machine Learning Models and Ensembles [J].
Bartoszewski, Filip Wieslaw ;
Just, Mike ;
Lones, Michael A. ;
Mandrychenko, Oleksii .
ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2021, 2021, 625 :367-381
[5]  
Cullen M., 2011, ANN C SOC IND ORG PS
[6]   DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning [J].
Du, Min ;
Li, Feifei ;
Zheng, Guineng ;
Srikumar, Vivek .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :1285-1298
[7]   Image-Based Feature Representation for Insider Threat Classification [J].
Gayathri, R. G. ;
Sajjanhar, Atul ;
Xiang, Yong .
APPLIED SCIENCES-BASEL, 2020, 10 (14)
[8]  
Ge Dingwei, 2022, 2022 3rd International Conference on Electronics, Communications and Information Technology (CECIT), P359, DOI 10.1109/CECIT58139.2022.00069
[9]   Recent advances in convolutional neural networks [J].
Gu, Jiuxiang ;
Wang, Zhenhua ;
Kuen, Jason ;
Ma, Lianyang ;
Shahroudy, Amir ;
Shuai, Bing ;
Liu, Ting ;
Wang, Xingxing ;
Wang, Gang ;
Cai, Jianfei ;
Chen, Tsuhan .
PATTERN RECOGNITION, 2018, 77 :354-377
[10]  
Gurucul, 2023, 2023 INS THREAT REP