Anomaly-Based Insider Threat Detection via Hierarchical Information Fusion

被引:1
|
作者
Wang, Enzhi [1 ,2 ]
Li, Qicheng [1 ]
Zhao, Shiwan
Han, Xue [3 ]
机构
[1] Nankai Univ, Coll Comp Sci, Tianjin, Peoples R China
[2] Shanxi Univ, Taiyuan, Peoples R China
[3] China Mobile Res Inst, Beijing, Peoples R China
关键词
insider threat detection; anomaly detection; hierarchical fusion;
D O I
10.1007/978-3-031-44213-1_2
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Insider threats can cause serious damage to organizations and insider threat detection has received increasing attention from research and industries in recent years. Anomaly-based methods are one of the important approaches for insider threat detection. Existing anomaly-based methods usually detect anomalies in either the entire sample space or the individual user space. However, we argue that whether the behavior is anomalous depends on the corresponding contextual information and the context scope can have more granularities. Overall normal behavior may be anomalous within a specific department, while normal behavior within a department may be anomalous for a specific person. To this end, in this paper, we propose a novel insider threat detection method that explicitly models anomalies with hierarchical context scopes (i.e., organization, department, and person) and fuses them to compute anomaly scores. Comparisons with the unsupervised state-of-the-art approaches on the CMU CERT dataset demonstrate the effectiveness of the proposed method. Our method won the first prize in the CCF-BDCI competition.
引用
收藏
页码:13 / 25
页数:13
相关论文
共 50 条
  • [31] Anomaly-Based Annotation Errors Detection in TTS Corpora
    Matousek, Jindrich
    Tihelka, Daniel
    16TH ANNUAL CONFERENCE OF THE INTERNATIONAL SPEECH COMMUNICATION ASSOCIATION (INTERSPEECH 2015), VOLS 1-5, 2015, : 314 - +
  • [32] A transparent and scalable anomaly-based DoS detection method
    Joldzic, Ognjen
    Djuric, Zoran
    Vuletic, Pavle
    COMPUTER NETWORKS, 2016, 104 : 27 - 42
  • [33] Virtual Machine Introspection for Anomaly-Based Keylogger Detection
    Huseynov, Huseyn
    Kourai, Kenichi
    Saadawi, Tarek
    Igbe, Obinna
    2020 IEEE 21ST INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE SWITCHING AND ROUTING (IEEE HPSR), 2020,
  • [34] Anomaly-based intrusion detection using Bayesian networks
    Tylman, Wojciech
    DEPCOS - RELCOMEX 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DEPENDABILITY OF COMPUTER SYSTEMS, 2008, : 211 - +
  • [35] SCADA Networks Anomaly-based Intrusion Detection System
    Almehmadi, Abdulaziz
    11TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS (SIN 2018), 2018,
  • [36] Anomaly-Based Intrusion Detection Algorithms for Wireless Networks
    Fragkiadakis, Alexandros G.
    Siris, Vasilios A.
    Petroulakis, Nikolaos
    WIRED-WIRELESS INTERNET COMMUNICATIONS, PROCEEDINGS, 2010, 6074 : 192 - 203
  • [37] Anomaly-based Intrusion Detection System for smart lighting
    Lara, Agustin
    Estepa, Antonio
    Estepa, Rafael
    Diaz-Verdejo, Jesus E.
    Mayor, Vicente
    INTERNET OF THINGS, 2024, 28
  • [38] Anomaly-Based Network Intrusion Detection Using SVM
    Zhang, Yuan
    Yang, Qinghai
    Lambotharan, Sangarapillai
    Kyriakopoulos, Konstantinos
    Ghafir, Ibrahim
    AsSadhan, Basil
    2019 11TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2019,
  • [39] Hierarchical Feature Fusion based Reconstruction Network for Unsupervised Anomaly Detection
    Zhao, Binjie
    Nie, Jiahao
    Guan, Siwei
    Wang, Han
    He, Zhiwei
    Gao, Mingyu
    2022 IEEE 27TH INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2022,
  • [40] Feature Selection for Effective Anomaly-Based Intrusion Detection
    Ghali, Noreen I.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (03): : 285 - 289