Anomaly Detection for Insider Threats Using Unsupervised Ensembles

被引:48
作者
Le, Duc C. [1 ]
Zincir-Heywood, Nur [1 ]
机构
[1] Dalhousie Univ, Fac Comp Sci, Halifax, NS B3H 4R2, Canada
来源
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT | 2021年 / 18卷 / 02期
基金
加拿大自然科学与工程研究理事会;
关键词
Insider threat detection; anomaly detection; ensemble learning; unsupervised learning; temporal data; dependable and robust learning;
D O I
10.1109/TNSM.2021.3071928
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Insider threat represents a major cybersecurity challenge to companies, organizations, and government agencies. Insider threat detection involves many challenges, including unbalanced data, limited ground truth, and possible user behavior changes. This research presents an unsupervised learning based anomaly detection approach for insider threat detection. We employ four unsupervised learning methods with different working principles, and explore various representations of data with temporal information. Furthermore, different computational intelligence schemes are explored to combine these models to create anomaly detection ensembles for improving the detection performance. Evaluation results show that the approach allows learning from unlabelled data under challenging conditions for insider threat detection. Insider threats are detected with high detection and low false positive rates. For example, 60% of malicious insiders are detected under 0.1% investigation budget, and all malicious insiders are detected at less than 5% investigation budget. Furthermore, we explore the ability of the proposed approach to generalize for detecting new anomalous behaviors in different datasets, i.e., robustness. Finally, results demonstrate that a voting-based ensemble of anomaly detection can be used to improve detection performance as well as the robustness. Comparisons with the state-of-the-art confirm the effectiveness of the proposed approach.
引用
收藏
页码:1152 / 1164
页数:13
相关论文
共 57 条
[1]  
Abadi M, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P265
[2]  
Aggarwal C., 2016, Outlier Analysis, V2nd
[3]   A Trust Aware Unsupervised Learning Approach for Insider Threat Detection [J].
Aldairi, Maryam ;
Karimi, Leila ;
Joshi, James .
2019 IEEE 20TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION FOR DATA SCIENCE (IRI 2019), 2019, :89-98
[4]  
[Anonymous], INS THREAT TEST DAT
[5]  
[Anonymous], 2015, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
[6]  
[Anonymous], INT C LEARNING REPRE
[7]   Behavioral Analysis of Insider Threat: A Survey and Bootstrapped Prediction in Imbalanced Data [J].
Azaria, Amos ;
Richardson, Ariella ;
Kraus, Sarit ;
Subrahmanian, V. S. .
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2014, 1 (02) :135-155
[8]   TSFEL: Time Series Feature Extraction Library [J].
Barandas, Marilia ;
Folgado, Duarte ;
Fernandes, Leticia ;
Santos, Sara ;
Abreu, Mariana ;
Bota, Patricia ;
Liu, Hui ;
Schultz, Tanja ;
Gamboa, Hugo .
SOFTWAREX, 2020, 11
[9]  
Barreno M., 2006, P 2006 ACM S INF COM, P16
[10]   Network Anomaly Detection: Methods, Systems and Tools [J].
Bhuyan, Monowar H. ;
Bhattacharyya, D. K. ;
Kalita, J. K. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :303-336