Graph Intelligence Enhanced Bi-Channel Insider Threat Detection

被引:18
作者
Hong, Wei [1 ]
Yin, Jiao [2 ]
You, Mingshan [2 ]
Wang, Hua [2 ]
Cao, Jinli [3 ]
Li, Jianxin [4 ]
Liu, Ming [4 ]
机构
[1] Chongqing Univ Arts & Sci, Sch Artificial Intelligence, Chongqing 402160, Peoples R China
[2] Victoria Univ, Inst Sustainable Ind & Liveable Cities, Melbourne, Vic 3011, Australia
[3] La Trobe Univ, Dept Comp Sci & Informat Technol, Melbourne, Vic 3086, Australia
[4] Deakin Univ, Sch Informat Technol, Melbourne, Vic 3125, Australia
来源
NETWORK AND SYSTEM SECURITY, NSS 2022 | 2022年 / 13787卷
关键词
Insider threat; Graph neural networks; Topological feature; Supervised learning;
D O I
10.1007/978-3-031-23020-2_5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For an organization, insider intrusion generally poses far more detrimental threats than outsider intrusion. Traditionally, insider threat is detected by analyzing logged user behaviours and then establishing a binary classifier to distinguish malicious ones. However, most approaches consider user behaviour in an isolated manner, inevitably missing the background information from organizational connections such as a shared supervisor or e-mail interactions. Consequently, the performance of those existing works still has the potential to be enhanced. In this paper, we propose a bi-channel insider threat detection (B-CITD) framework enhanced by graph intelligence to improve the overall performance of existing methods. Firstly, We extract behavioural features from a series of log files as the inner-user channel features. Secondly, we construct an organizational connection graph and extract topological features through a graph neural networks (GNN) model as the inter-user channel features. In the end, the features from inner-user and inter-user channels are combined together to perform an insider threat detection task through a binary classification model. Experimental results on an open-sourced CERT 4.2 dataset show that B-CITD can enhance the performance of insider threat detection by a large margin, compared with using features only from inner-user or inter-user channels. We published our code on GitHub: https://github.com/Wayne-on-the- road/B-CITD.
引用
收藏
页码:86 / 102
页数:17
相关论文
共 42 条
[1]  
[Anonymous], 2021, ACC STAT CYB RES 202
[2]   Graph-based technologies for intelligence analysis [J].
Coffman, T ;
Greenblatt, S ;
Marcus, S .
COMMUNICATIONS OF THE ACM, 2004, 47 (03) :45-47
[3]   Insider Threat Detection Through Attributed Graph Clustering [J].
Gamachchi, Anagi ;
Boztas, Serdar .
2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, :112-119
[4]   Profiling users in GUI based systems for masquerade detection [J].
Garg, Ashish ;
Rahalkar, Ragini ;
Upadhyaya, Shambhu ;
Kwiat, Kevin .
2006 IEEE INFORMATION ASSURANCE WORKSHOP, 2006, :48-+
[5]  
Gavai G., 2015, P 7 ACM CCS INT WORK, P13
[6]   Bridging the Gap: A Pragmatic Approach to Generating Insider Threat Data [J].
Glasser, Joshua ;
Lindauer, Brian .
IEEE CS SECURITY AND PRIVACY WORKSHOPS (SPW 2013), 2013, :98-104
[7]  
Hamilton WL, 2017, ADV NEUR IN, V30
[8]   Insight Into Insiders and IT: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures [J].
Homoliak, Ivan ;
Toffalini, Flavio ;
Guarnizo, Juan ;
Elovici, Yuval ;
Ochoa, Martin .
ACM COMPUTING SURVEYS, 2019, 52 (02)
[9]   Anomaly Detection with Graph Convolutional Networks for Insider Threat and Fraud Detection [J].
Jiang, Jianguo ;
Chen, Jiuming ;
Gu, Tianbo ;
Choo, Kim-Kwang Raymond ;
Liu, Chao ;
Yu, Min ;
Huang, Weiqing ;
Mohapatra, Prasant .
MILCOM 2019 - 2019 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2019,
[10]   Microaggregation Sorting Framework for K-Anonymity Statistical Disclosure Control in Cloud Computing [J].
Kabir, Md Enamul ;
Mahmood, Abdun Naser ;
Wang, Hua ;
Mustafa, Abdul K. .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2020, 8 (02) :408-417