Experimental Evaluation of Insider Threat Detection Methods Based on Temporal Representation

被引:1
|
作者
Lu, Gaole [1 ]
Zhang, Huixiang [1 ]
Liu, Tianluo [1 ]
Liao, Kaihua [1 ]
Feng, Chun [1 ]
机构
[1] Northwestern Polytech Univ, Sch Cyberspace Secur, Xian, Peoples R China
关键词
insider threats; unsupervised algorithm; supervised algorithm; temporal representation; performance metrics;
D O I
10.1109/ICICN56848.2022.10006539
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
At present, insider threat detection faces many challenges, such as imbalanced data sets, the complexity of malicious behavior, high data dimension, and difficulty for manual analysis to keep up with the data growth rate. An experimental evaluation of insider threat detection methods is carried in this paper. Firstly, the open data set is divided by day and week. Then, various temporal representations including percentile, mean difference, median difference, and concatenation of instances representations, are used to extract potential information. Four unsupervised machine learning algorithms and a supervised algorithm are comprehensively compared to explore the best detection schemes under different temporal representations. To comprehensively evaluate the detection performance of the algorithms, four commonly used performance metrics (i.e. Detection rate (DR), Precision (PR), F1-score (F1), Area Under the Curve (AUC)) are introduced. The experimental results show that the random forest algorithm can achieve the best detection results using day granularity data combined with median differential representation-meddiff30, and the DR, PR, F1, and AUC are 75.43%, 99.59%, 85.84%, and 87.71% respectively. For the four unsupervised detection algorithms, under the 20% investigation budget, the autoencoder combined with percentile representation-percentile30 in day granularity achieved DR of 95.83%, and AUC of 94.93%, with higher PR and F1 values under the same conditions. The local outlier factor algorithm combined with concatenation representation-c3 under week granularity achieved the highest DR, but the scheme of the autoencoder combined with percentile30 still achieved the highest PR, F1, and AUC.
引用
收藏
页码:682 / 688
页数:7
相关论文
共 50 条
  • [1] ITDBERT: Temporal-semantic Representation for Insider Threat Detection
    Huang, Weiqing
    Zhu, He
    Li, Ce
    Lv, Qiujian
    Wang, Yan
    Yang, Haitian
    26TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (IEEE ISCC 2021), 2021,
  • [2] Insider threat detection based on deep belief network feature representation
    Lin, Lingli
    Zhong, Shangping
    Jia, Cunmin
    Chen, Kaizhi
    2017 INTERNATIONAL CONFERENCE ON GREEN INFORMATICS (ICGI), 2017, : 54 - 59
  • [3] Research Opportunity of Insider Threat Detection based on Machine Learning Methods
    Prajitno, Noer Tjahja Moekthi
    Hadiyanto, H.
    Rochim, Adian Fatchur
    2023 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE IN INFORMATION AND COMMUNICATION, ICAIIC, 2023, : 292 - 296
  • [4] Distance Measurement Methods for Improved Insider Threat Detection
    Lo, Owen
    Buchanan, William J.
    Griffiths, Paul
    Macfarlane, Richard
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [5] Temporal Behavior in Network Traffic as a Basis for Insider Threat Detection
    Rajchel, Brett
    Monaco, John, V
    Singh, Gurminder
    Hu, Angela
    Shingleton, Jarrod
    Anderson, Thomas
    2020 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (SSCI), 2020, : 1427 - 1434
  • [6] Temporal Semantic Parsing for Insider Threat Activity Modeling and Detection
    AlSlaiman, Muhanned
    Wang, Christopher
    Salman, Mohammed
    Asiri, Ahmad
    IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE, NAECON 2024, 2024, : 44 - 49
  • [7] Deep Temporal Graph Infomax for Imbalanced Insider Threat Detection
    Gao, Peng
    Zhang, Haotian
    Wang, Ming
    Yang, Weiyong
    Wei, Xinshen
    Lv, Zhuo
    Ma, Zengzhou
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2025, 65 (01) : 108 - 118
  • [8] Exploring Feature Normalization and Temporal Information for Machine Learning Based Insider Threat Detection
    Ferreira, Pedro
    Le, Duc C.
    Zincir-Heywood, Nur
    2019 15TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT (CNSM), 2019,
  • [9] Image-Based Feature Representation for Insider Threat Classification
    Gayathri, R. G.
    Sajjanhar, Atul
    Xiang, Yong
    APPLIED SCIENCES-BASEL, 2020, 10 (14):
  • [10] Insider Threat Detection via Hierarchical Neural Temporal Point Processes
    Yuan, Shuhan
    Zheng, Panpan
    Wu, Xintao
    Li, Qinghua
    2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2019, : 1343 - 1350