An insider threat detection method based on improved Test-Time Training model

被引:0
|
作者
Tao, Xiaoling [1 ]
Liu, Jianxiang [1 ]
Yu, Yuelin [1 ]
Zhang, Haijing [2 ]
Huang, Ying [1 ]
机构
[1] Guilin Univ Elect Technol, Sch Comp Sci & Informat Secur, Guilin 541004, Peoples R China
[2] Georgia State Univ, Dept Comp Sci, Atlanta, GA 30302 USA
来源
HIGH-CONFIDENCE COMPUTING | 2025年 / 5卷 / 01期
基金
中国国家自然科学基金;
关键词
Insider threats; Test-Time training; Residual network; Efficient channel attention mechanism;
D O I
10.1016/j.hcc.2024.100283
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As network and information systems become widely adopted across industries, cybersecurity concerns have grown more prominent. Among these concerns, insider threats are considered particularly covert and destructive. Insider threats refer to malicious insiders exploiting privileged access to networks, systems, and data to intentionally compromise organizational security. Detecting these threats is challenging due to the complexity and variability of user behavior data, combined with the subtle and covert nature of insider actions. Traditional detection methods often fail to capture both longterm dependencies and short-term fluctuations in time-series data, which are crucial for identifying anomalous behaviors. To address these issues, this paper introduces the Test-Time Training (TTT) model for the first time in the field of insider threat detection, and proposes a detection method based on the TTT-ECA-ResNet model. First, the dataset is preprocessed. TTT is applied to extract long-term dependencies in features, effectively capturing dynamic sequence changes. The Residual Network, incorporating the Efficient Channel Attention mechanism, is used to extract local feature patterns, capturing relationships between different positions in time-series data. Finally, a Linear layer is employed for more precise detection of insider threats. The proposed approaches were evaluated using the CMU CERT Insider Threat Dataset, achieving an AUC of 98.75% and an F1-score of 96.81%. The experimental results demonstrate the effectiveness of the proposed methods, outperforming other state-of-the-art approaches. (c) 2024 The Author(s). Published by Elsevier B.V. on behalf of Shandong University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页数:9
相关论文
共 50 条
  • [1] Improved Self-Training for Test-Time Adaptation
    Ma, Jing
    2024 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2024, : 23701 - 23710
  • [2] Uncertainty guided test-time training for face forgery detection
    Xu, Pengxiang
    He, Yang
    Yang, Jian
    Zhang, Shanshan
    COMPUTER VISION AND IMAGE UNDERSTANDING, 2024, 249
  • [3] Adversarial Training for Robust Insider Threat Detection
    Gayathri, R. G.
    Sajjanhar, Atul
    Xiang, Yong
    2022 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2022,
  • [4] Test-Time Training on Video Streams
    Wang, Renhao
    Sun, Yu
    Tandon, Arnuv
    Gandelsman, Yossi
    Chen, Xinlei
    Efros, Alexei A.
    Wang, Xiaolong
    JOURNAL OF MACHINE LEARNING RESEARCH, 2025, 26 : 1 - 29
  • [5] Test-Time Training with Masked Autoencoders
    Gandelsman, Yossi
    Sun, Yu
    Chen, Xinlei
    Efros, Alexei A.
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 35 (NEURIPS 2022), 2022,
  • [6] An insider threat detection method based on business process mining
    Zhu, Taiming
    Guo, Yuanbo
    Ju, Ankang
    Ma, Jun
    Wang, Xuan
    International Journal of Business Data Communications and Networking, 2017, 13 (02): : 83 - 98
  • [7] Research on insider threat detection method based on variational autoencoding
    Zhang, Zhenjiang
    Zhao, Lulu
    Zhang, Yang
    Zhou, Hongde
    Li, Wei
    Journal of Computers (Taiwan), 2021, 32 (04) : 201 - 210
  • [8] An Insider Threat Detection Method Based on User Behavior Analysis
    Jiang, Wei
    Tian, Yuan
    Liu, Weixin
    Liu, Wenmao
    INTELLIGENT INFORMATION PROCESSING IX, 2018, 538 : 421 - 429
  • [9] IMPROVED ACTIVATION CLIPPING FOR UNIVERSAL BACKDOOR MITIGATION AND TEST-TIME DETECTION
    Anomalee Inc. & Pennsylvania State University, United States
    不详
    arXiv,
  • [10] Unsupervised Detection and Correction of Model Calibration Shift at Test-Time
    Shashikumar, Supreeth P.
    Amrollahi, Fatemeh
    Nemati, Shamim
    2023 45TH ANNUAL INTERNATIONAL CONFERENCE OF THE IEEE ENGINEERING IN MEDICINE & BIOLOGY SOCIETY, EMBC, 2023,