Anomaly-Based Insider Threat Detection via Hierarchical Information Fusion

被引:1
|
作者
Wang, Enzhi [1 ,2 ]
Li, Qicheng [1 ]
Zhao, Shiwan
Han, Xue [3 ]
机构
[1] Nankai Univ, Coll Comp Sci, Tianjin, Peoples R China
[2] Shanxi Univ, Taiyuan, Peoples R China
[3] China Mobile Res Inst, Beijing, Peoples R China
关键词
insider threat detection; anomaly detection; hierarchical fusion;
D O I
10.1007/978-3-031-44213-1_2
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Insider threats can cause serious damage to organizations and insider threat detection has received increasing attention from research and industries in recent years. Anomaly-based methods are one of the important approaches for insider threat detection. Existing anomaly-based methods usually detect anomalies in either the entire sample space or the individual user space. However, we argue that whether the behavior is anomalous depends on the corresponding contextual information and the context scope can have more granularities. Overall normal behavior may be anomalous within a specific department, while normal behavior within a department may be anomalous for a specific person. To this end, in this paper, we propose a novel insider threat detection method that explicitly models anomalies with hierarchical context scopes (i.e., organization, department, and person) and fuses them to compute anomaly scores. Comparisons with the unsupervised state-of-the-art approaches on the CMU CERT dataset demonstrate the effectiveness of the proposed method. Our method won the first prize in the CCF-BDCI competition.
引用
收藏
页码:13 / 25
页数:13
相关论文
共 50 条
  • [1] Anomaly-based Insider Threat Detection using Deep Autoencoders
    Liu, Liu
    De Vel, Olivier
    Chen, Chao
    Zhang, Jun
    Xiang, Yang
    2018 18TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW), 2018, : 39 - 48
  • [2] Robust Anomaly-Based Insider Threat Detection Using Graph Neural Network
    Xiao, Junchao
    Yang, Lin
    Zhong, Fuli
    Wang, Xiaolei
    Chen, Hongbo
    Li, Dongyang
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2023, 20 (03): : 3717 - 3733
  • [3] Insider Threat Detection Model Using Anomaly-Based Isolation Forest Algorithm
    Al-Shehari, Taher
    Al-Razgan, Muna
    Alfakih, Taha
    Alsowail, Rakan A.
    Pandiaraj, Saravanan
    IEEE ACCESS, 2023, 11 : 118170 - 118185
  • [4] Design of an Anomaly-based Threat Detection & Explication System
    Luh, Robert
    Schrittwieser, Sebastian
    Marschalek, Stefan
    Janicke, Helge
    ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 397 - 402
  • [5] Poster: Design of an Anomaly-based Threat Detection & Explication System
    Luh, Robert
    Schrittwieser, Sebastian
    Marschalek, Stefan
    Janicke, Helge
    Weippl, Edgar
    PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 119 - 120
  • [6] Multi-Domain Information Fusion for Insider Threat Detection
    Eldardiry, Hoda
    Bart, Evgeniy
    Liu, Juan
    Hanley, John
    Price, Bob
    Brdiczka, Oliver
    IEEE CS SECURITY AND PRIVACY WORKSHOPS (SPW 2013), 2013, : 45 - 51
  • [7] Anomaly-based threat detection in smart health using machine learning
    Tabassum, Muntaha
    Mahmood, Saba
    Bukhari, Amal
    Alshemaimri, Bader
    Daud, Ali
    Khalique, Fatima
    BMC MEDICAL INFORMATICS AND DECISION MAKING, 2024, 24 (01)
  • [8] Insider Threat Detection via Hierarchical Neural Temporal Point Processes
    Yuan, Shuhan
    Zheng, Panpan
    Wu, Xintao
    Li, Qinghua
    2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2019, : 1343 - 1350
  • [9] Insider Threat Detection Based on User Behavior Modeling and Anomaly Detection Algorithms
    Kim, Junhong
    Park, Minsik
    Kim, Haedong
    Cho, Suhyoun
    Kang, Pilsung
    APPLIED SCIENCES-BASEL, 2019, 9 (19):
  • [10] Hierarchical Anomaly-Based Detection of Distributed DNS Attacks on Enterprise Networks
    Lyu, Minzhao
    Gharakheili, Hassan Habibi
    Russell, Craig
    Sivaraman, Vijay
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (01): : 1031 - 1048