Reducing False Positives Of User-to-Entity First-Access Alerts for User Behavior Analytics

被引:8
作者
Tang, Baoming [1 ]
Hu, Qiaona [1 ]
Lin, Derek [1 ]
机构
[1] Exabeam Inc, San Mateo, CA 94403 USA
来源
2017 17TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW 2017) | 2017年
关键词
INTRUSION DETECTION; RECOMMENDER SYSTEMS; ANOMALY DETECTION;
D O I
10.1109/ICDMW.2017.111
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Detecting security threats from compromised account or malicious insider by leveraging enterprise traffic logs is the goal of user behavior-based analytics. For its ease of interpretation, a common analytic indicator used in the industry for user behavior analytics is whether a user accesses a network entity, such as a machine or process, for the first time. While this popular indicator does correlate well with the threat activities, it has the potential of generating volumes of false positives. This creates a problem for an analytic system of which the first-time access alerting capability is a part. We believe that the false positive rate from the indicator can be reduced by learning from users' historical entity access patterns and user context information. If the first-time access is expected, then its corresponding alert is suppressed. In this paper, we propose a user-to-entity prediction score which uses a recommender system for learning user data. In particular, we use factorization machines, along with necessary data normalization steps, to make predictions on real-world enterprise logs. We demonstrate this novel method is capable of reducing false positives of users' first-time entity access alerts in user behavior analytics applications.
引用
收藏
页码:804 / 811
页数:8
相关论文
共 29 条
  • [1] Ahlm E., 2016, MARKET TRENDS USER E
  • [2] [Anonymous], 1704, ARXIV13111704
  • [3] [Anonymous], 2012, OAKLEY SYSTEMS SUREV
  • [4] [Anonymous], 2012, MICROSOFT NTLM
  • [5] Bayer I, 2016, J MACH LEARN RES, V17
  • [6] Bhaumik R., 2006, P 4 WORKSH INT TECHN
  • [7] Brumfield J., 2016, Verizon's 2016 data breach investigations report finds cybercriminals are exploiting human nature
  • [8] Eskin Eleazar, 2002, APPL DATA MINING COM, V6, P77, DOI DOI 10.1007/978-1-4615-0953-0_4
  • [9] Anomaly-based network intrusion detection: Techniques, systems and challenges
    Garcia-Teodoro, P.
    Diaz-Verdejo, J.
    Macia-Fernandez, G.
    Vazquez, E.
    [J]. COMPUTERS & SECURITY, 2009, 28 (1-2) : 18 - 28
  • [10] Goldberg Y., 2014, ARXIV