Graph Intelligence Enhanced Bi-Channel Insider Threat Detection

被引:16
作者
Hong, Wei [1 ]
Yin, Jiao [2 ]
You, Mingshan [2 ]
Wang, Hua [2 ]
Cao, Jinli [3 ]
Li, Jianxin [4 ]
Liu, Ming [4 ]
机构
[1] Chongqing Univ Arts & Sci, Sch Artificial Intelligence, Chongqing 402160, Peoples R China
[2] Victoria Univ, Inst Sustainable Ind & Liveable Cities, Melbourne, Vic 3011, Australia
[3] La Trobe Univ, Dept Comp Sci & Informat Technol, Melbourne, Vic 3086, Australia
[4] Deakin Univ, Sch Informat Technol, Melbourne, Vic 3125, Australia
来源
NETWORK AND SYSTEM SECURITY, NSS 2022 | 2022年 / 13787卷
关键词
Insider threat; Graph neural networks; Topological feature; Supervised learning;
D O I
10.1007/978-3-031-23020-2_5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For an organization, insider intrusion generally poses far more detrimental threats than outsider intrusion. Traditionally, insider threat is detected by analyzing logged user behaviours and then establishing a binary classifier to distinguish malicious ones. However, most approaches consider user behaviour in an isolated manner, inevitably missing the background information from organizational connections such as a shared supervisor or e-mail interactions. Consequently, the performance of those existing works still has the potential to be enhanced. In this paper, we propose a bi-channel insider threat detection (B-CITD) framework enhanced by graph intelligence to improve the overall performance of existing methods. Firstly, We extract behavioural features from a series of log files as the inner-user channel features. Secondly, we construct an organizational connection graph and extract topological features through a graph neural networks (GNN) model as the inter-user channel features. In the end, the features from inner-user and inter-user channels are combined together to perform an insider threat detection task through a binary classification model. Experimental results on an open-sourced CERT 4.2 dataset show that B-CITD can enhance the performance of insider threat detection by a large margin, compared with using features only from inner-user or inter-user channels. We published our code on GitHub: https://github.com/Wayne-on-the- road/B-CITD.
引用
收藏
页码:86 / 102
页数:17
相关论文
共 42 条
  • [1] [Anonymous], 2021, ACC STAT CYB RES 202
  • [2] Graph-based technologies for intelligence analysis
    Coffman, T
    Greenblatt, S
    Marcus, S
    [J]. COMMUNICATIONS OF THE ACM, 2004, 47 (03) : 45 - 47
  • [3] Insider Threat Detection Through Attributed Graph Clustering
    Gamachchi, Anagi
    Boztas, Serdar
    [J]. 2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 112 - 119
  • [4] Profiling users in GUI based systems for masquerade detection
    Garg, Ashish
    Rahalkar, Ragini
    Upadhyaya, Shambhu
    Kwiat, Kevin
    [J]. 2006 IEEE INFORMATION ASSURANCE WORKSHOP, 2006, : 48 - +
  • [5] Gavai G., 2015, P 7 ACM CCS INT WORK, P13, DOI DOI 10.1145/2808783.2808784
  • [6] Bridging the Gap: A Pragmatic Approach to Generating Insider Threat Data
    Glasser, Joshua
    Lindauer, Brian
    [J]. IEEE CS SECURITY AND PRIVACY WORKSHOPS (SPW 2013), 2013, : 98 - 104
  • [7] Hamilton WL, 2017, ADV NEUR IN, V30
  • [8] Insight Into Insiders and IT: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures
    Homoliak, Ivan
    Toffalini, Flavio
    Guarnizo, Juan
    Elovici, Yuval
    Ochoa, Martin
    [J]. ACM COMPUTING SURVEYS, 2019, 52 (02)
  • [9] Anomaly Detection with Graph Convolutional Networks for Insider Threat and Fraud Detection
    Jiang, Jianguo
    Chen, Jiuming
    Gu, Tianbo
    Choo, Kim-Kwang Raymond
    Liu, Chao
    Yu, Min
    Huang, Weiqing
    Mohapatra, Prasant
    [J]. MILCOM 2019 - 2019 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2019,
  • [10] Microaggregation Sorting Framework for K-Anonymity Statistical Disclosure Control in Cloud Computing
    Kabir, Md Enamul
    Mahmood, Abdun Naser
    Wang, Hua
    Mustafa, Abdul K.
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2020, 8 (02) : 408 - 417