An improved feature extraction algorithm for insider threat using hidden Markov model on user behavior detection

被引:11
|
作者
Ye, Xiaoyun [1 ]
Han, Myung-Mook [2 ]
机构
[1] Gachon Univ, Dept Comp Sci, Seongnam, South Korea
[2] Gachon Univ, Dept Software, Seongnam, South Korea
基金
新加坡国家研究基金会;
关键词
Hidden Markov model; Insider threat detection; Viterbi algorithm; Anomaly detection;
D O I
10.1108/ICS-12-2019-0142
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Purpose By using a new feature extraction method on the Cert data set and using a hidden Markov model (HMM) to model and analyze the behavior of users to distinguish whether the behavior is normal within a continuous period. Design/methodology/approach Feature extraction of five parts of the time series by rules and sorting in chronological order. Use the obtained features to calculate the probability parameters required by the HMM model and establish a behavior model for each user. When the user has abnormal behavior, the model will return a very low probability value to distinguish between normal and abnormal information. Findings Generally, HMM parameters are obtained by supervised learning and unsupervised learning, but the hidden state cannot be clearly defined. When the hidden state is determined according to the data set, the accuracy of the model will be improved. Originality/value This paper proposes a new feature extraction method and analysis mode, which determines the shape of the hidden state according to the situation of the data set, making subsequent HMM modeling simple and efficient and in turn improving the accuracy of user behavior detection.
引用
收藏
页码:19 / 36
页数:18
相关论文
共 50 条
  • [31] Keystroke Biometric User Verification Using Hidden Markov Model
    Ali, Md Liakat
    Thakur, Kutub
    Tappert, Charles C.
    Qiu, Meikang
    2016 IEEE 3RD INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2016, : 204 - 209
  • [32] Spam Email Detection using ID3 Algorithm and Hidden Markov Model
    Kumar, Vikrant
    Monika
    Kumar, Parveen
    Sharma, Ambalika
    2018 CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (CICT'18), 2018,
  • [33] Query-by-Example Spoken Term Detection Using Bottleneck Feature and Hidden Markov Model
    Liu, Xue
    Guo, Wu
    Wang, Niansong
    2015 12TH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (FSKD), 2015, : 1319 - 1323
  • [34] A Discrete Feature Vector for Endpoint Detection of Speech with Hidden Markov Model
    Lee, Jeiky
    Oh, Chang Hyuck
    KOREAN JOURNAL OF APPLIED STATISTICS, 2008, 21 (06) : 959 - 967
  • [35] Dynamic Community Detection Algorithm Based On Hidden Markov Model
    Dong, Zhe
    PROCEEDINGS OF THE 2016 INTERNATIONAL SYMPOSIUM ON ADVANCES IN ELECTRICAL, ELECTRONICS AND COMPUTER ENGINEERING (ISAEECE), 2016, 69 : 288 - 294
  • [36] Web information extraction using generalized hidden Markov model
    Zhong, Ping
    Chen, Jinlin
    Cook, Terry
    2006 1ST IEEE WORKSHOP ON HOT TOPICS IN WEB SYSTEMS AND TECHNOLOGIES, 2006, : 142 - +
  • [37] Extraction of Key Information in Web News Based on Improved Hidden Markov Model
    Liu Z.
    Du Y.
    Shi S.
    Data Analysis and Knowledge Discovery, 2019, 3 (03) : 120 - 128
  • [38] SeqA-ITD: User Behavior Sequence Augmentation for Insider Threat Detection at Multiple Time Granularities
    Zhang, Fangtao
    Ma, Xiu
    Huang, Weiqing
    2022 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2022,
  • [39] 3D Hand Motion Tracking Using Improved Hidden Markov Model of Behavior
    Gai, Wei
    Feng, Zhiquan
    Yang, Bo
    Lin, Yan
    Song, Xianhui
    JOURNAL OF COMPUTERS, 2012, 7 (03) : 730 - 735
  • [40] Automated Insider Threat Detection System Using User and Role-Based Profile Assessment
    Legg, Philip A.
    Buckley, Oliver
    Goldsmith, Michael
    Creese, Sadie
    IEEE SYSTEMS JOURNAL, 2017, 11 (02): : 503 - 512