Learning Correlation Graph and Anomalous Employee Behavior for Insider Threat Detection

被引:0
|
作者
Pratibha [1 ]
Wang, Junshan [1 ]
Aggarwal, Saurabh [1 ,2 ]
Ji, Feng [1 ]
Tay, Wee Peng [1 ]
机构
[1] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
[2] Boeing Res & Technol, Bangalore, Karnataka, India
来源
2018 21ST INTERNATIONAL CONFERENCE ON INFORMATION FUSION (FUSION) | 2018年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Insider attacks can result in significant costs to an organization. There is an urgent need for an automatic insider threat detector with good accuracy and low false alarms. In this work, we propose a graph based insider threat detector to identify potential insider attackers based on identifying not only self-anomalous behaviors of an employee but also anomalies relative to other employees with similar job roles. A machine learning approach is developed to first infer the correlation graph among the organization's employees. Then, a graph signal processing method is designed to identify the potential insiders with detection and false positive rates better than performing detection independently on each employee. Our approach demonstrates that the correlated behaviors of an organization's employees should be exploited for a better detection of suspicious behaviors.
引用
收藏
页码:595 / 601
页数:7
相关论文
共 50 条
  • [1] SENTINEL: Insider Threat Detection Based on Multi-Timescale User Behavior Interaction Graph Learning
    Xiao, Fengrui
    Chen, Shuangwu
    Chen, Siyang
    Ma, Yuanyi
    He, Huasen
    Yang, Jian
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2025, 12 (02): : 774 - 790
  • [2] Contrastive Learning for Insider Threat Detection
    Vinay, M. S.
    Yuan, Shuhan
    Wu, Xintao
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, DASFAA 2022, PT I, 2022, : 395 - 403
  • [3] Machine Learning for Insider Threat Detection
    Naicker, Tristan Sashlen
    van Niekerk, Brett
    PROCEEDINGS OF THE 3RD EUROPEAN CONFERENCE ON THE IMPACT OF ARTIFICIAL INTELLIGENCE AND ROBOTICS (ECIAIR 2021), 2021, : 122 - 131
  • [4] Graph-based insider threat detection: A survey
    Gong, Yiru
    Cui, Susu
    Liu, Song
    Jiang, Bo
    Dong, Cong
    Lu, Zhigang
    COMPUTER NETWORKS, 2024, 254
  • [5] A Graph Based Framework for Malicious Insider Threat Detection
    Gamachchi, Anagi
    Sun, Li
    Boztas, Serdar
    PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 2638 - 2647
  • [6] Insider Threat Detection Through Attributed Graph Clustering
    Gamachchi, Anagi
    Boztas, Serdar
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 112 - 119
  • [7] Exploring anomalous behaviour detection and classification for insider threat identification
    Le, Duc C.
    Zincir-Heywood, Nur
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2021, 31 (04)
  • [8] Anomaly Detection with Graph Convolutional Networks for Insider Threat and Fraud Detection
    Jiang, Jianguo
    Chen, Jiuming
    Gu, Tianbo
    Choo, Kim-Kwang Raymond
    Liu, Chao
    Yu, Min
    Huang, Weiqing
    Mohapatra, Prasant
    MILCOM 2019 - 2019 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2019,
  • [9] Deep Temporal Graph Infomax for Imbalanced Insider Threat Detection
    Gao, Peng
    Zhang, Haotian
    Wang, Ming
    Yang, Weiyong
    Wei, Xinshen
    Lv, Zhuo
    Ma, Zengzhou
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2025, 65 (01) : 108 - 118
  • [10] Insider Threat Detection Using a Graph-Based Approach
    Eberle, William
    Graves, Jeffrey
    Holder, Lawrence
    JOURNAL OF APPLIED SECURITY RESEARCH, 2010, 6 (01) : 32 - 81