An improved feature extraction algorithm for insider threat using hidden Markov model on user behavior detection

被引:12
作者
Ye, Xiaoyun [1 ]
Han, Myung-Mook [2 ]
机构
[1] Gachon Univ, Dept Comp Sci, Seongnam, South Korea
[2] Gachon Univ, Dept Software, Seongnam, South Korea
基金
新加坡国家研究基金会;
关键词
Hidden Markov model; Insider threat detection; Viterbi algorithm; Anomaly detection;
D O I
10.1108/ICS-12-2019-0142
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Purpose By using a new feature extraction method on the Cert data set and using a hidden Markov model (HMM) to model and analyze the behavior of users to distinguish whether the behavior is normal within a continuous period. Design/methodology/approach Feature extraction of five parts of the time series by rules and sorting in chronological order. Use the obtained features to calculate the probability parameters required by the HMM model and establish a behavior model for each user. When the user has abnormal behavior, the model will return a very low probability value to distinguish between normal and abnormal information. Findings Generally, HMM parameters are obtained by supervised learning and unsupervised learning, but the hidden state cannot be clearly defined. When the hidden state is determined according to the data set, the accuracy of the model will be improved. Originality/value This paper proposes a new feature extraction method and analysis mode, which determines the shape of the hidden state according to the situation of the data set, making subsequent HMM modeling simple and efficient and in turn improving the accuracy of user behavior detection.
引用
收藏
页码:19 / 36
页数:18
相关论文
共 35 条
[1]  
[Anonymous], 1990, Hidden Markov Models for Speech Recognition
[2]  
Asmussen, 2008, APPL PROBABILITY QUE, P7
[3]   Big Data Meet Cyber-Physical Systems: A Panoramic Survey [J].
Atat, Rachad ;
Liu, Lingjia ;
Wu, Jinsong ;
Li, Guangyu ;
Ye, Chunxuan ;
Yi, Yang .
IEEE ACCESS, 2018, 6 :73603-73636
[4]   Enabling cyber-physical communication in 5G cellular networks: Challenges, spatial spectrum sensing, and cyber-security [J].
Atat, Rachad ;
Liu, Lingjia ;
Chen, Hao ;
Wu, Jinsong ;
Li, Hongxiang ;
Yi, Yang .
IET Cyber-Physical Systems: Theory and Applications, 2017, 2 (01) :49-54
[5]  
Baum L., 1972, Inequalities, V3, P1
[6]   GROWTH TRANSFORMATIONS FOR FUNCTIONS ON MANIFOLDS [J].
BAUM, LE ;
SELL, GR .
PACIFIC JOURNAL OF MATHEMATICS, 1968, 27 (02) :211-&
[7]   STATISTICAL INFERENCE FOR PROBABILISTIC FUNCTIONS OF FINITE STATE MARKOV CHAINS [J].
BAUM, LE ;
PETRIE, T .
ANNALS OF MATHEMATICAL STATISTICS, 1966, 37 (06) :1554-&
[8]   AN INEQUALITY WITH APPLICATIONS TO STATISTICAL ESTIMATION FOR PROBABILISTIC FUNCTIONS OF MARKOV PROCESSES AND TO A MODEL FOR ECOLOGY [J].
BAUM, LE ;
EAGON, JA .
BULLETIN OF THE AMERICAN MATHEMATICAL SOCIETY, 1967, 73 (03) :360-&
[9]   A MAXIMIZATION TECHNIQUE OCCURRING IN STATISTICAL ANALYSIS OF PROBABILISTIC FUNCTIONS OF MARKOV CHAINS [J].
BAUM, LE ;
PETRIE, T ;
SOULES, G ;
WEISS, N .
ANNALS OF MATHEMATICAL STATISTICS, 1970, 41 (01) :164-&
[10]   Dempster-Shafer fusion of multisensor signals in nonstationary Markovian context [J].
Boudaren, Mohamed El Yazid ;
Monfrini, Emmanuel ;
Pieczynski, Wojciech ;
Aissani, Amar .
EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2012,