Anomaly-Based Insider Threat Detection via Hierarchical Information Fusion

被引:1
|
作者
Wang, Enzhi [1 ,2 ]
Li, Qicheng [1 ]
Zhao, Shiwan
Han, Xue [3 ]
机构
[1] Nankai Univ, Coll Comp Sci, Tianjin, Peoples R China
[2] Shanxi Univ, Taiyuan, Peoples R China
[3] China Mobile Res Inst, Beijing, Peoples R China
关键词
insider threat detection; anomaly detection; hierarchical fusion;
D O I
10.1007/978-3-031-44213-1_2
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Insider threats can cause serious damage to organizations and insider threat detection has received increasing attention from research and industries in recent years. Anomaly-based methods are one of the important approaches for insider threat detection. Existing anomaly-based methods usually detect anomalies in either the entire sample space or the individual user space. However, we argue that whether the behavior is anomalous depends on the corresponding contextual information and the context scope can have more granularities. Overall normal behavior may be anomalous within a specific department, while normal behavior within a department may be anomalous for a specific person. To this end, in this paper, we propose a novel insider threat detection method that explicitly models anomalies with hierarchical context scopes (i.e., organization, department, and person) and fuses them to compute anomaly scores. Comparisons with the unsupervised state-of-the-art approaches on the CMU CERT dataset demonstrate the effectiveness of the proposed method. Our method won the first prize in the CCF-BDCI competition.
引用
收藏
页码:13 / 25
页数:13
相关论文
共 50 条
  • [21] Insider threat prediction based on unsupervised anomaly detection scheme for proactive forensic investigation
    Wei, Yichen
    Chow, Kam-Pui
    Yiu, Siu-Ming
    FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2021, 38
  • [22] Image-Based Insider Threat Detection via Geometric Transformation
    Li, Dongyang
    Yang, Lin
    Zhang, Hongguang
    Wang, Xiaolei
    Ma, Linru
    Xiao, Junchao
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [23] On the symbiosis of specification-based and anomaly-based detection
    Stakhanova, Natalia
    Basu, Samik
    Wong, Johnny
    COMPUTERS & SECURITY, 2010, 29 (02) : 253 - 268
  • [24] ANOMALY-BASED NETWORK INTRUSION DETECTION METHODS
    Nevlud, Pavel
    Bures, Miroslav
    Kapicak, Lukas
    Zdralek, Jaroslav
    ADVANCES IN ELECTRICAL AND ELECTRONIC ENGINEERING, 2013, 11 (06) : 468 - 474
  • [25] LSTM for Anomaly-Based Network Intrusion Detection
    Althubiti, Sara A.
    Jones, Eric Marcell, Jr.
    Roy, Kaushik
    2018 28TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2018, : 293 - 295
  • [26] Anomaly-Based Network Intrusion Detection System
    Villalba, L. J. G.
    Orozco, A. L. S.
    Vidal, J. M.
    IEEE LATIN AMERICA TRANSACTIONS, 2015, 13 (03) : 850 - 855
  • [27] Anomaly-Based Network Intrusion Detection: An Outlier Detection Techniques
    Kumar, Neeraj
    Kumar, Upendra
    PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND PATTERN RECOGNITION (SOCPAR 2016), 2018, 614 : 262 - 269
  • [28] Anomaly-based fault detection system in distributed system
    Kim, Byoung uk
    Hariri, Salim
    SERA 2007: 5TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH, MANAGEMENT, AND APPLICATIONS, PROCEEDINGS, 2007, : 782 - +
  • [29] An Anomaly-based Detection System for Monitoring Kubernetes Infrastructures
    Almaraz-Rivera, Josue Genaro
    IEEE LATIN AMERICA TRANSACTIONS, 2023, 21 (03) : 457 - 465
  • [30] Game Theoretical Method for Anomaly-Based Intrusion Detection
    Wang, Zhiyong
    Xu, Shengwei
    Xu, Guoai
    Yin, Yongfeng
    Zhang, Miao
    Sun, Dawei
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020