Supervised Learning for Insider Threat Detection Using Stream Mining

被引:32
|
作者
Parveen, Pallabi [1 ]
Weger, Zackary R. [1 ]
Thuraisingham, Bhavani [1 ]
Hamlen, Kevin [1 ]
Khan, Latifur [1 ]
机构
[1] Univ Texas Dallas, Dept Comp Sci, Richardson, TX 75083 USA
关键词
anomaly detection; support vector machine; insider threat; ensemble;
D O I
10.1109/ICTAI.2011.176
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Insider threat detection requires the identification of rare anomalies in contexts where evolving behaviors tend to mask such anomalies. This paper proposes and tests an ensemble-based stream mining algorithm based on supervised learning that addresses this challenge by maintaining an evolving collection of multiple models to classify dynamic data streams of unbounded length. The result is a classifier that exhibits substantially increased classification accuracy for real insider threat streams relative to traditional supervised learning (traditional SVM and one-class SVM) and other single-model approaches.
引用
收藏
页码:1032 / 1039
页数:8
相关论文
共 50 条
  • [21] Handling imbalance dataset issue in insider threat detection using machine learning methods
    Jaiswal, Ayshwarya
    Dwivedi, Pragya
    Dewang, Rupesh Kumar
    COMPUTERS & ELECTRICAL ENGINEERING, 2024, 120
  • [22] Embedding Learning with Heterogeneous Event Sequence for Insider Threat Detection
    Wang, Jiarong
    Cai, Lijun
    Yu, Aimin
    Meng, Dan
    2019 IEEE 31ST INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI 2019), 2019, : 947 - 954
  • [23] A Trust Aware Unsupervised Learning Approach for Insider Threat Detection
    Aldairi, Maryam
    Karimi, Leila
    Joshi, James
    2019 IEEE 20TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION FOR DATA SCIENCE (IRI 2019), 2019, : 89 - 98
  • [24] Deep learning for insider threat detection: Review, challenges and opportunities
    Yuan, Shuhan
    Wu, Xintao
    COMPUTERS & SECURITY, 2021, 104
  • [25] Insider Threat Detection using Virtual Machine Introspection
    Crawford, Martin
    Peterson, Gilbert
    PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 1821 - 1830
  • [26] Insider Threat Detection: A Review
    Manoharan, Phavithra
    Yin, Jiao
    Wang, Him
    Zhang, Yanchun
    Ye, Wenjie
    2024 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS, NANA 2024, 2024, : 147 - 153
  • [27] Insider threat detection for specific threat scenarios
    Tian, Tian
    Zhang, Chen
    Jiang, Bo
    Feng, Huamin
    Lu, Zhigang
    CYBERSECURITY, 2025, 8 (01):
  • [28] Insider Threat Detection in PRODIGAL
    Goldberg, Henry G.
    Young, William T.
    Reardon, Matthew G.
    Phillips, Brian J.
    Senator, Ted E.
    PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 2648 - 2657
  • [29] Towards Process Mining Utilization in Insider Threat Detection from Audit Logs
    Macak, Martin
    Vanat, Ivan
    Merjavy, Michal
    Jevocin, Tomas
    Buhnova, Barbora
    2020 SEVENTH INTERNATIONAL CONFERENCE ON SOCIAL NETWORK ANALYSIS, MANAGEMENT AND SECURITY (SNAMS), 2020, : 250 - 255
  • [30] Mining user cross-domain behavior patterns for insider threat detection
    Wen Y.
    Wang W.-P.
    Meng D.
    1600, Science Press (39): : 1555 - 1569