A Hybrid Model Based on Multi-dimensional Features for Insider Threat Detection

被引:11
|
作者
Lv, Bin [1 ,2 ]
Wang, Dan [1 ,2 ]
Wang, Yan [1 ]
Lv, Qiujian [1 ,2 ]
Lu, Dan [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing 100093, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100049, Peoples R China
基金
中国国家自然科学基金;
关键词
Insider threat detection; Information fusion; Hybrid model; Isolation Forest; Markov model;
D O I
10.1007/978-3-319-94268-1_28
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Insider threats have shown their power by hugely affecting national security, financial stability, and the privacy of many people. A number of techniques have been proposed to detect insider threats by comparing behaviors among different individuals or by comparing the behaviors across different time periods of the same individual. However, both of them always fail to identify the certain kinds of inside threats due to the fact that the behaviors of insider threats are complex and diverse. To deal with this issue, this paper focuses on constructing a hybrid model to detect insider threats based on multi-dimensional features. First, an Across-Domain Anomaly Detection (ADAD) model is proposed to identify anomalous behaviors that deviate from the behaviors of their peers based on the isolation Forest algorithm. Second, an Across-Time Anomaly Detection (ATAD) model is proposed to measure the degree of unusual changes of a user's behavior based on an improved Markov model. What's more, we propose a hybrid model to integrate the evidence from the above two models ADAD and ATAD. To evaluate the performance of the proposed models comprehensively, we implement a series of experiments with the 17-month data. The experimental results show that the ADAD and ATAD models are robust and the hybrid model can outperform the two separated models obviously.
引用
收藏
页码:333 / 344
页数:12
相关论文
共 50 条
  • [21] Multi-Dimensional Traffic Congestion Detection Based on Fusion of Visual Features and Convolutional Neural Network
    Ke, Xiao
    Shi, Lingfeng
    Guo, Wenzhong
    Chen, Dewang
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2019, 20 (06) : 2157 - 2170
  • [22] Multi-dimensional traffic anomaly detection based on ICA
    Li Zonglin
    Hu Guangmin
    Yao Xingmiao
    ISCC: 2009 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1 AND 2, 2009, : 333 - 336
  • [23] A Fault Localization Approach Based on BiRNN and Multi-Dimensional Features
    Yan, Yue
    Jiang, Shujuan
    Wang, Rongcun
    Zhang, Cheng
    Wang, Chen
    Zhang, Shengang
    Wen, Min
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2022, 32 (08) : 1179 - 1201
  • [24] Multi-Domain Information Fusion for Insider Threat Detection
    Eldardiry, Hoda
    Bart, Evgeniy
    Liu, Juan
    Hanley, John
    Price, Bob
    Brdiczka, Oliver
    IEEE CS SECURITY AND PRIVACY WORKSHOPS (SPW 2013), 2013, : 45 - 51
  • [25] Insider Threat Detection Based on Deep Clustering of Multi-Source Behavioral Events
    Wang, Jiarong
    Sun, Qianran
    Zhou, Caiqiu
    APPLIED SCIENCES-BASEL, 2023, 13 (24):
  • [26] Insider Threat Detection Model Enhancement Using Hybrid Algorithms between Unsupervised and Supervised Learning
    Yi, Junkai
    Tian, Yongbo
    ELECTRONICS, 2024, 13 (05)
  • [27] User behaviour based insider threat detection model using an LSTM integrated RF model
    Maheswaran, S. K. Uma
    Rajasekar, L.
    Choudhury, Ziaul Haque
    Shahade, Makarand
    NETWORK-COMPUTATION IN NEURAL SYSTEMS, 2025,
  • [28] An Effective Insider Threat Detection Apporoach Based on BPNN
    Tao, Xiaoling
    Liu, Runrong
    Fu, Lianyou
    Qiu, Qiqi
    Yu, Yuelin
    Zhang, Haijing
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2022), PT I, 2022, 13471 : 231 - 243
  • [29] Graph-based insider threat detection: A survey
    Gong, Yiru
    Cui, Susu
    Liu, Song
    Jiang, Bo
    Dong, Cong
    Lu, Zhigang
    COMPUTER NETWORKS, 2024, 254
  • [30] A Graph Based Framework for Malicious Insider Threat Detection
    Gamachchi, Anagi
    Sun, Li
    Boztas, Serdar
    PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 2638 - 2647