Anomaly Detection Using Deep Learning and Big Data Analytics for the Insider Threat Platform

被引:0
作者
Alam, Abu [1 ]
Barron, Harry [1 ]
机构
[1] Univ Gloucestershire, Cheltenham, Glos, England
来源
INTELLIGENT COMPUTING, VOL 1 | 2022年 / 506卷
关键词
Insider threat; Deep learning; Big data; Cyber security; Anomaly detection; MACHINE;
D O I
10.1007/978-3-031-10461-9_35
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Insider Threat is not a new principle, with examples of trusted insiders being malicious throughout human history, from Julius Caesar to Edward Snowden. Recently, Insiders are becoming an everincreasing threat to organisations, being among the most damaging of security breaches; as these do not originate from external factors, but from trusted employees with access to sensitive company information and systems. Establishing whether observed behavioural data is anomalous or benign is an important task; becoming an even more complex problem when combined with the big data available to an Insider Threat platform. The work presented within this research employs a data-driven approach to the analysis of large-scale time-series data generated by a large volume of users interacting with an organisation over an extended period. First, this research identified and provided a comprehensive overview of techniques currently employed by Insider Threat teams to determine possible security threats, examining the utilised approaches in comparison to current deep anomaly detection techniques. Then, these methods were utilised to implement a process of using anomaly detection and deep learning techniques for improved identification of potential Insiders.
引用
收藏
页码:512 / 531
页数:20
相关论文
共 47 条
[1]   A survey of machine-learning and nature-inspired based credit card fraud detection techniques [J].
Adewumi A.O. ;
Akinyelu A.A. .
International Journal of System Assurance Engineering and Management, 2017, 8 (Suppl 2) :937-953
[2]   Anomaly detection optimization using big data and deep learning to reduce false-positive [J].
Al Jallad, Khloud ;
Aljnidi, Mohamad ;
Desouki, Mohammad Said .
JOURNAL OF BIG DATA, 2020, 7 (01)
[3]  
[Anonymous], 2016, P 7 INT WORKSH HLTH
[4]  
[Anonymous], 2006, the 44th annual Southeast regional conference
[5]  
[Anonymous], 2013, Engineering statistics handbook
[6]   BLITHE: Behavior Rule-Based Insider Threat Detection for Smart Grid [J].
Bao, Haiyong ;
Lu, Rongxing ;
Li, Beibei ;
Deng, Ruilong .
IEEE INTERNET OF THINGS JOURNAL, 2016, 3 (02) :190-205
[7]   The insider threat: Behavioral indicators and factors influencing likelihood of intervention [J].
Bell, Alison J. C. ;
Rogers, M. Brooke ;
Pearce, Julia M. .
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2019, 24 :166-176
[8]   An Insider Cyber Threat Prediction Mechanism Based on Behavioral Analysis [J].
Bhavsar, Kaushal ;
Trivedi, Bhushan H. .
PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ICT FOR SUSTAINABLE DEVELOPMENT ICT4SD 2015, VOL 2, 2016, 409 :345-353
[9]  
Bradford P. G., 2005, P 21 ANN COMP SEC AP
[10]  
Braei Mohammad, 2020, ARXIV