Feature Engineering Method Using Double-Layer Hidden Markov Model for Insider Threat Detection

被引:10
作者
Ye, Xiaoyun [1 ]
Hong, Sung-Sam [1 ]
Han, Myung-Mook [1 ]
机构
[1] Gachon Univ, Dept Comp Sci, Seongnam, South Korea
基金
新加坡国家研究基金会;
关键词
Hidden Markov Model (HMM); User behavior; Insider threat; Feature engineering; Anomaly detection;
D O I
10.5391/IJFIS.2020.20.1.17
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the past, most Hidden Markov models based on time series only used the original HMM model. The single-layer models (HMMs) structure has a big problem, and it isn't straightforward to play its due role when it is necessary to make fine adjustments to the scene. So it was impossible to entirely and flexibly perform user behavior. This paper performs feature extraction and analysis of user behavior data of time series. The data labels should be added after the parameters obtained by statistical methods for clustering to obtain the first hidden state, and the layers are further layered according to working hours and outside working hours. The experimental results show that the method has strong applicability and flexibility, and can quickly detect abnormal behavior.
引用
收藏
页码:17 / 25
页数:9
相关论文
共 20 条
[1]  
[Anonymous], 1990, Hidden Markov Models for Speech Recognition
[2]  
[Anonymous], 2014, Speech and language processing
[3]   STATISTICAL INFERENCE FOR PROBABILISTIC FUNCTIONS OF FINITE STATE MARKOV CHAINS [J].
BAUM, LE ;
PETRIE, T .
ANNALS OF MATHEMATICAL STATISTICS, 1966, 37 (06) :1554-&
[4]   Detecting homogeneous segments in DNA sequences by using hidden Markov models [J].
Boys, RJ ;
Henderson, DA ;
Wilkinson, DJ .
JOURNAL OF THE ROYAL STATISTICAL SOCIETY SERIES C-APPLIED STATISTICS, 2000, 49 :269-285
[5]  
Bunke Horst., 2001, HIDDEN MARKOV MODELS
[6]  
CERT Insider Threat Center, 2011, CERT INS THREAT DAT
[7]   Multi-Domain Information Fusion for Insider Threat Detection [J].
Eldardiry, Hoda ;
Bart, Evgeniy ;
Liu, Juan ;
Hanley, John ;
Price, Bob ;
Brdiczka, Oliver .
IEEE CS SECURITY AND PRIVACY WORKSHOPS (SPW 2013), 2013, :45-51
[8]  
Ester M., 1996, KDD-96 Proceedings. Second International Conference on Knowledge Discovery and Data Mining, P226
[9]  
Forney G.D., 2005, The viterbi algorithm: A personal history
[10]  
Gamachchi A., 2017, P 50 HAW INT C SYST