Exploring anomalous behaviour detection and classification for insider threat identification

被引:23
作者
Le, Duc C. [1 ]
Zincir-Heywood, Nur [1 ]
机构
[1] Dalhousie Univ, Fac Comp Sci, Halifax, NS, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Supervised learning - Anomaly detection;
D O I
10.1002/nem.2109
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, malicious insider threats represent one of the most damaging threats to companies and government agencies. Insider threat detection is a highly skewed data analysis problem, where the huge class imbalance makes the adaptation of learning algorithms to the real-world context very difficult. This study proposes a new system for user-centred machine learning-based anomaly behaviour and insider threat detection on multiple data granularity levels. System evaluations and analysis are performed not only on individual data instances but also on normal and malicious users. Our results show that the proposed system, which is a combination of unsupervised anomaly detection and supervised machine learning methods, can learn from unlabelled data and a very small amount of labelled data. Furthermore, it can generalize to bigger datasets for detecting anomalous behaviours and unseen malicious insiders with a high detection and a low false-positive rate.
引用
收藏
页数:19
相关论文
共 51 条
[11]   Detecting Insider Theft of Trade Secrets [J].
Caputo, Deanna D. ;
Stephens, Gregory D. ;
Maloof, Marcus A. .
IEEE SECURITY & PRIVACY, 2009, 7 (06) :14-21
[12]  
*CERT EXACTDATA LL, INS THREAT TOOLS
[13]  
Chollet Francois, 2015, Keras
[14]  
Collins M. L., 2016, COMMON SENSE GUIDE M, Vfifth
[15]  
*DEF ADV RES PROJ, AN DET MULT SCAL ADA
[16]   The Effect of Data Sampling When Using Random Forest on Imbalanced Bioinformatics Data [J].
Dittman, David J. ;
Khoshgoftaar, Taghi M. ;
Napolitano, Amri .
2015 IEEE 16TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION, 2015, :457-463
[17]  
Dua S, 2011, DATA MINING AND MACHINE LEARNING IN CYBERSECURITY, P1, DOI 10.1201/b10867
[18]   A New Multisignature Scheme with Public Key Aggregation for Blockchain [J].
Duc-Phong Le ;
Yang, Guomin ;
Ghorbani, Ali .
2019 17TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2019, :89-95
[19]   Insider Threat Detection Using a Graph-Based Approach [J].
Eberle, William ;
Graves, Jeffrey ;
Holder, Lawrence .
JOURNAL OF APPLIED SECURITY RESEARCH, 2010, 6 (01) :32-81
[20]   Multi-Domain Information Fusion for Insider Threat Detection [J].
Eldardiry, Hoda ;
Bart, Evgeniy ;
Liu, Juan ;
Hanley, John ;
Price, Bob ;
Brdiczka, Oliver .
IEEE CS SECURITY AND PRIVACY WORKSHOPS (SPW 2013), 2013, :45-51