Insider Threat Detection in PRODIGAL

被引:0
作者
Goldberg, Henry G. [1 ]
Young, William T. [1 ]
Reardon, Matthew G. [1 ]
Phillips, Brian J. [1 ]
Senator, Ted E. [1 ]
机构
[1] Leidos Inc, Arlington, VA 22203 USA
来源
PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES | 2017年
关键词
Anomaly detection; insider threat; unsupervised ensembles; experimental case study;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper reports on insider threat detection research, during which a prototype system (PRODIGAL)1 was developed and operated as a testbed for exploring a range of detection and analysis methods. The data and test environment, system components, and the core method of unsupervised detection of insider threat leads are presented to document this work and benefit others working in the insider threat domain. We also discuss a core set of experiments evaluating the prototype's ability to detect both known and unknown malicious insider behaviors. The experimental results show the ability to detect a large variety of insider threat scenario instances imbedded in real data with no prior knowledge of what scenarios are present or when they occur. We report on an ensemble-based, unsupervised technique for detecting potential insider threat instances. When run over 16 months of real monitored computer usage activity augmented with independently developed and unknown but realistic, insider threat scenarios, this technique robustly achieves results within five percent of the best individual detectors identified after the fact. We discuss factors that contribute to the success of the ensemble method, such as the number and variety of unsupervised detectors and the use of prior knowledge encoded in detectors designed for specific activity patterns. Finally, the paper describes the architecture of the prototype system, the environment in which we conducted these experiments and that is in the process of being transitioned to operational users.
引用
收藏
页码:2648 / 2657
页数:10
相关论文
共 25 条
[1]  
Aggarwal C., 2013, P ACM SIGKDD WORKSH
[2]  
Aggarwal C. C., 2015, Data mining, P237
[3]  
Akoglu Leman., 2013, ICWSM, P2
[4]  
Bowen B., 2010, INSIDER THREATS CYBE
[5]  
Brdiczka O., 2012, SPW 12 P 2012 IEEE S, DOI [10.1109/SPW.2012.29, DOI 10.1109/SPW.2012.29]
[6]  
Cappelli Dawn, 2012, The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud)
[7]   Ensemble methods in machine learning [J].
Dietterich, TG .
MULTIPLE CLASSIFIER SYSTEMS, 2000, 1857 :1-15
[8]   Multi-Domain Information Fusion for Insider Threat Detection [J].
Eldardiry, Hoda ;
Bart, Evgeniy ;
Liu, Juan ;
Hanley, John ;
Price, Bob ;
Brdiczka, Oliver .
IEEE CS SECURITY AND PRIVACY WORKSHOPS (SPW 2013), 2013, :45-51
[9]  
Gavai G., 2015, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, V6, DOI DOI 10.22667/JOWUA.2015.12.31.047
[10]   Bridging the Gap: A Pragmatic Approach to Generating Insider Threat Data [J].
Glasser, Joshua ;
Lindauer, Brian .
IEEE CS SECURITY AND PRIVACY WORKSHOPS (SPW 2013), 2013, :98-104