Exploring anomalous behaviour detection and classification for insider threat identification

被引:23
作者
Le, Duc C. [1 ]
Zincir-Heywood, Nur [1 ]
机构
[1] Dalhousie Univ, Fac Comp Sci, Halifax, NS, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Supervised learning - Anomaly detection;
D O I
10.1002/nem.2109
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, malicious insider threats represent one of the most damaging threats to companies and government agencies. Insider threat detection is a highly skewed data analysis problem, where the huge class imbalance makes the adaptation of learning algorithms to the real-world context very difficult. This study proposes a new system for user-centred machine learning-based anomaly behaviour and insider threat detection on multiple data granularity levels. System evaluations and analysis are performed not only on individual data instances but also on normal and malicious users. Our results show that the proposed system, which is a combination of unsupervised anomaly detection and supervised machine learning methods, can learn from unlabelled data and a very small amount of labelled data. Furthermore, it can generalize to bigger datasets for detecting anomalous behaviours and unseen malicious insiders with a high detection and a low false-positive rate.
引用
收藏
页数:19
相关论文
共 51 条
[1]  
Abadi M, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P265
[2]  
Achlioptas Dimitris, 2001, P 20 ACM SIGMOD SIGA, P274, DOI DOI 10.1145/375551.375608
[3]  
Aggarwal C. C., 2016, Outlier analysis, V2nd
[4]   Behavioral Analysis of Insider Threat: A Survey and Bootstrapped Prediction in Imbalanced Data [J].
Azaria, Amos ;
Richardson, Ariella ;
Kraus, Sarit ;
Subrahmanian, V. S. .
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2014, 1 (02) :135-155
[5]   Network Anomaly Detection: Methods, Systems and Tools [J].
Bhuyan, Monowar H. ;
Bhattacharyya, D. K. ;
Kalita, J. K. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :303-336
[6]   Detecting Insider Threats Using RADISH: A System for Real-Time Anomaly Detection in Heterogeneous Data Streams [J].
Bose, Brock ;
Avasarala, Bhargav ;
Tirthapura, Srikanta ;
Chung, Yung-Yu ;
Steiner, Donald .
IEEE SYSTEMS JOURNAL, 2017, 11 (02) :471-482
[7]   Random forests [J].
Breiman, L .
MACHINE LEARNING, 2001, 45 (01) :5-32
[8]   A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection [J].
Buczak, Anna L. ;
Guven, Erhan .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02) :1153-1176
[9]  
CA Technologies, 2018, 2018 Insider threat report
[10]  
Campagna R., ENTERPRISE INSIDER T