Anomaly Detection for Insider Threats Using Unsupervised Ensembles

被引:48
作者
Le, Duc C. [1 ]
Zincir-Heywood, Nur [1 ]
机构
[1] Dalhousie Univ, Fac Comp Sci, Halifax, NS B3H 4R2, Canada
来源
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT | 2021年 / 18卷 / 02期
基金
加拿大自然科学与工程研究理事会;
关键词
Insider threat detection; anomaly detection; ensemble learning; unsupervised learning; temporal data; dependable and robust learning;
D O I
10.1109/TNSM.2021.3071928
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Insider threat represents a major cybersecurity challenge to companies, organizations, and government agencies. Insider threat detection involves many challenges, including unbalanced data, limited ground truth, and possible user behavior changes. This research presents an unsupervised learning based anomaly detection approach for insider threat detection. We employ four unsupervised learning methods with different working principles, and explore various representations of data with temporal information. Furthermore, different computational intelligence schemes are explored to combine these models to create anomaly detection ensembles for improving the detection performance. Evaluation results show that the approach allows learning from unlabelled data under challenging conditions for insider threat detection. Insider threats are detected with high detection and low false positive rates. For example, 60% of malicious insiders are detected under 0.1% investigation budget, and all malicious insiders are detected at less than 5% investigation budget. Furthermore, we explore the ability of the proposed approach to generalize for detecting new anomalous behaviors in different datasets, i.e., robustness. Finally, results demonstrate that a voting-based ensemble of anomaly detection can be used to improve detection performance as well as the robustness. Comparisons with the state-of-the-art confirm the effectiveness of the proposed approach.
引用
收藏
页码:1152 / 1164
页数:13
相关论文
共 57 条
[11]   Uncovering Lateral Movement Using Authentication Logs [J].
Bian, Haibo ;
Bai, Tim ;
Salahuddin, Mohammad A. ;
Limam, Noura ;
Daya, Abbas Abou ;
Boutaba, Raouf .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (01) :1049-1063
[12]   Detecting Insider Threats Using RADISH: A System for Real-Time Anomaly Detection in Heterogeneous Data Streams [J].
Bose, Brock ;
Avasarala, Bhargav ;
Tirthapura, Srikanta ;
Chung, Yung-Yu ;
Steiner, Donald .
IEEE SYSTEMS JOURNAL, 2017, 11 (02) :471-482
[13]   LOF: Identifying density-based local outliers [J].
Breunig, MM ;
Kriegel, HP ;
Ng, RT ;
Sander, J .
SIGMOD RECORD, 2000, 29 (02) :93-104
[14]   Recurrent Neural Network Attention Mechanisms for Interpretable System Log Anomaly Detection [J].
Brown, Andy ;
Tuor, Aaron ;
Hutchinson, Brian ;
Nichols, Nicole .
PROCEEDINGS OF THE 1ST WORKSHOP ON MACHINE LEARNING FOR COMPUTING SYSTEMS (MLCS 2018), 2018,
[15]   A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection [J].
Buczak, Anna L. ;
Guven, Erhan .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02) :1153-1176
[16]  
Campagna R., ENTERPRISE INSIDER T
[17]   On the evaluation of unsupervised outlier detection: measures, datasets, and an empirical study [J].
Campos, Guilherme O. ;
Zimek, Arthur ;
Sander, Jorg ;
Campello, Ricardo J. G. B. ;
Micenkova, Barbora ;
Schubert, Erich ;
Assent, Ira ;
Houle, Michael E. .
DATA MINING AND KNOWLEDGE DISCOVERY, 2016, 30 (04) :891-927
[18]  
Collins M. L, 2016, CMUSEI2015T010 CERT
[19]  
Crowd Research Partners, 2018, REP
[20]  
CSO CERT Division of SEI-CMU U.S. Secret Service and KnowBe4, 2018, REP