Graph-based insider threat detection: A survey

被引:0
|
作者
Gong, Yiru [1 ,2 ]
Cui, Susu [1 ,2 ]
Liu, Song [1 ,2 ]
Jiang, Bo [1 ,2 ]
Dong, Cong [3 ]
Lu, Zhigang [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[3] Zhongguancun Lab, Beijing, Peoples R China
关键词
Insider threat analysis; Graph model; Anomaly detection; Cyber security;
D O I
10.1016/j.comnet.2024.110757
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Insider threat detection has been a significant topic in recent years. However, as network technology develops, the intranet becomes more complex. Therefore, simply matching attack patterns or using traditional machine learning methods (Logistic Regression, Gaussian-NB, Random Forest, etc.) does not work well. On the other hand, the graph structure can better adapt to intranet data, thus graph-based insider threat detection methods have become mainstream. In order to study the design and effectiveness of graph-based insider threat detection, in this paper, we conduct a systematic and comprehensive survey of existing related research. Specifically, we provide a framework and a taxonomy based on the detection process, classifying existing work from three aspects: data collection, graph construction, and graph anomaly detection. We conduct a quantitative analysis of existing representative graph methods and find that the models with more information have better performance. In particular, we discuss the scalability of existing methods to large-scale networks and their feasibility in real environments. Based on the survey results, we propose 7 pain points in this field and provide specific future research directions. Our survey will provide future researchers with a complete solution.
引用
收藏
页数:21
相关论文
共 50 条
  • [1] Insider Threat Detection Using a Graph-Based Approach
    Eberle, William
    Graves, Jeffrey
    Holder, Lawrence
    JOURNAL OF APPLIED SECURITY RESEARCH, 2010, 6 (01) : 32 - 81
  • [2] Insider Threat Detection Using Graph-Based Approaches
    Eberle, William
    Holder, Lawrence
    CATCH 2009: CYBERSECURITY APPLICATIONS AND TECHNOLOGY CONFERENCE FOR HOMELAND SECURITY, PROCEEDINGS, 2009, : 237 - +
  • [3] A Graph Based Framework for Malicious Insider Threat Detection
    Gamachchi, Anagi
    Sun, Li
    Boztas, Serdar
    PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 2638 - 2647
  • [4] Insider Threat Detection Based On Heterogeneous Graph Neural Network
    Tian, Tian
    Gong, Yiru
    Jiang, Bo
    Liu, Junrong
    Feng, Huamin
    Lu, Zhigang
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 628 - 635
  • [5] Warder: Online Insider Threat Detection System Using Multi-Feature Modeling and Graph-Based Correlation
    Jiang, Jianguo
    Chen, Jiuming
    Gu, Tianbo
    Choo, Kim-Kwang Raymond
    Liu, Chao
    Yu, Min
    Huang, Weiqing
    Mohapatra, Prasant
    MILCOM 2019 - 2019 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2019,
  • [6] Applying Graph-Based Anomaly Detection Approaches to the Discovery of Insider Threats
    Eberle, William
    Holder, Lawrence
    ISI: 2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2009, : 206 - +
  • [7] A graph empowered insider threat detection framework based on daily activities
    Hong, Wei
    Yin, Jiao
    You, Mingshan
    Wang, Hua
    Cao, Jinli
    Li, Jianxin
    Liu, Ming
    Man, Chengyuan
    ISA TRANSACTIONS, 2023, 141 : 84 - 92
  • [8] A Graph Convolution Neural Network Based Method for Insider Threat Detection
    Fei, Kexiong
    Zhou, Jiang
    Su, Lin
    Wang, Weiping
    Chen, Yong
    Zhang, Fan
    2022 IEEE INTL CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, BIG DATA & CLOUD COMPUTING, SUSTAINABLE COMPUTING & COMMUNICATIONS, SOCIAL COMPUTING & NETWORKING, ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM, 2022, : 66 - 73
  • [9] Insider Threat Detection Through Attributed Graph Clustering
    Gamachchi, Anagi
    Boztas, Serdar
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 112 - 119
  • [10] Insider threat detection approach for tobacco industry based on heterogeneous graph embedding
    Ji, Qi
    Li, Wei
    Pan, Bailin
    Xue, Hongkai
    Qiu, Xiang
    High Technology Letters, 2024, 30 (02) : 199 - 210