An improved feature extraction algorithm for insider threat using hidden Markov model on user behavior detection

被引:11
作者
Ye, Xiaoyun [1 ]
Han, Myung-Mook [2 ]
机构
[1] Gachon Univ, Dept Comp Sci, Seongnam, South Korea
[2] Gachon Univ, Dept Software, Seongnam, South Korea
基金
新加坡国家研究基金会;
关键词
Hidden Markov model; Insider threat detection; Viterbi algorithm; Anomaly detection;
D O I
10.1108/ICS-12-2019-0142
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Purpose By using a new feature extraction method on the Cert data set and using a hidden Markov model (HMM) to model and analyze the behavior of users to distinguish whether the behavior is normal within a continuous period. Design/methodology/approach Feature extraction of five parts of the time series by rules and sorting in chronological order. Use the obtained features to calculate the probability parameters required by the HMM model and establish a behavior model for each user. When the user has abnormal behavior, the model will return a very low probability value to distinguish between normal and abnormal information. Findings Generally, HMM parameters are obtained by supervised learning and unsupervised learning, but the hidden state cannot be clearly defined. When the hidden state is determined according to the data set, the accuracy of the model will be improved. Originality/value This paper proposes a new feature extraction method and analysis mode, which determines the shape of the hidden state according to the situation of the data set, making subsequent HMM modeling simple and efficient and in turn improving the accuracy of user behavior detection.
引用
收藏
页码:19 / 36
页数:18
相关论文
共 50 条
  • [41] Efficient anomaly detection by modeling privilege flows using hidden Markov model
    Cho, SB
    Park, HJ
    COMPUTERS & SECURITY, 2003, 22 (01) : 45 - 55
  • [42] Warder: Online Insider Threat Detection System Using Multi-Feature Modeling and Graph-Based Correlation
    Jiang, Jianguo
    Chen, Jiuming
    Gu, Tianbo
    Choo, Kim-Kwang Raymond
    Liu, Chao
    Yu, Min
    Huang, Weiqing
    Mohapatra, Prasant
    MILCOM 2019 - 2019 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2019,
  • [43] Digital watermark extraction in wavelet domain using hidden Markov model
    Amini, Marzieh
    Ahmad, M. Omair
    Swamy, M. N. S.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (03) : 3731 - 3749
  • [44] Using hidden Markov model for information extraction based on multiple templates
    Liu, YZ
    Lin, YP
    Chen, ZP
    2003 INTERNATIONAL CONFERENCE ON NATURAL LANGUAGE PROCESSING AND KNOWLEDGE ENGINEERING, PROCEEDINGS, 2003, : 394 - 399
  • [45] Digital watermark extraction in wavelet domain using hidden Markov model
    Marzieh Amini
    M. Omair Ahmad
    M. N. S. Swamy
    Multimedia Tools and Applications, 2017, 76 : 3731 - 3749
  • [46] Credit card fraud detection using hidden Markov model
    Srivastava, Abhinav
    Kundu, Amlan
    Sural, Shamik
    Majumdar, Arun K.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2008, 5 (01) : 37 - 48
  • [47] ANOMALY NETWORK INTRUSION DETECTION USING HIDDEN MARKOV MODEL
    Chen, Chia-Mei
    Guan, Dah-Jyh
    Huang, Yu-Zhi
    Ou, Ya-Hui
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2016, 12 (02): : 569 - 580
  • [48] Attack Sequence Detection in Cloud Using Hidden Markov Model
    Chen, Chia-Mei
    Guan, D. J.
    Huang, Yu-Zhi
    Ou, Ya-Hui
    PROCEEDINGS OF THE 2012 SEVENTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2012), 2012, : 100 - 103
  • [49] Collusion set detection using a quasi hidden Markov model
    Wu, Zhengxiao
    Wu, Xiaoyu
    STATISTICS AND ITS INTERFACE, 2013, 6 (01) : 53 - 64
  • [50] Community detection model for dynamic networks based on hidden Markov model and evolutionary algorithm
    Abbood, Amenah D.
    Attea, Bara'a A.
    Hasan, Ammar A.
    Everson, Richard M.
    Pizzuti, Clara
    ARTIFICIAL INTELLIGENCE REVIEW, 2023, 56 (09) : 9665 - 9697