Insider Threat Detection Through Attributed Graph Clustering

被引:20
作者
Gamachchi, Anagi [1 ]
Boztas, Serdar [1 ]
机构
[1] RMIT Univ, Sch Sci, Melbourne, Vic, Australia
来源
2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS | 2017年
基金
澳大利亚研究理事会;
关键词
D O I
10.1109/Trustcom/BigDataSE/ICESS.2017.227
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While most organizations continue to invest in traditional network defences, a formidable security challenge has been brewing within their own boundaries. Malicious insiders with privileged access in the guise of a trusted source have carried out many attacks causing far reaching damage to financial stability, national security and brand reputation for both public and private sector organizations. Growing exposure and impact of the whistleblower community and concerns about job security with changing organizational dynamics has further aggravated this situation. The unpredictability of malicious attackers, as well as the complexity of malicious actions, necessitates the careful analysis of network, system and user parameters correlated with insider threat problem. Thus it creates a high dimensional, heterogeneous data analysis problem in isolating suspicious users. This research work proposes an insider threat detection framework, which utilizes the attributed graph clustering techniques and outlier ranking mechanism for enterprise users. Empirical results also confirm the effectiveness of the method by achieving the best area under curve value of 0.7648 for the receiver operating characteristic curve.
引用
收藏
页码:112 / 119
页数:8
相关论文
共 27 条
[1]   Graph based anomaly detection and description: a survey [J].
Akoglu, Leman ;
Tong, Hanghang ;
Koutra, Danai .
DATA MINING AND KNOWLEDGE DISCOVERY, 2015, 29 (03) :626-688
[2]   A knowledge-base model for insider threat prediction [J].
Althebyan, Qutaibah ;
Panda, Brajendra .
2007 IEEE INFORMATION ASSURANCE WORKSHOP, 2007, :239-+
[3]  
[Anonymous], 2017 50 HAW INT C SY
[4]  
[Anonymous], 2012, CERT GUIDE INSIDER T
[5]  
[Anonymous], P ANN HAW INT C SYST
[6]  
[Anonymous], RANKING OUTLIER NODE
[7]  
[Anonymous], 2010, P 16 ACM SIGKDD INT, DOI DOI 10.1145/1835804.1835907
[8]  
Bishop Matt, 2009, 2009 IEEE Conference on Technologies for Homeland Security (HST), P385, DOI 10.1109/THS.2009.5168063
[9]  
Brdiczka O., 2012, SPW 12 P 2012 IEEE S, DOI [10.1109/SPW.2012.29, DOI 10.1109/SPW.2012.29]
[10]  
Chen YC, 2011, ROUTLEDGE RES TAIWAN, P63, DOI 10.1145/1943513.1943524