Anomaly-Based Insider Threat Detection via Hierarchical Information Fusion

被引:1
|
作者
Wang, Enzhi [1 ,2 ]
Li, Qicheng [1 ]
Zhao, Shiwan
Han, Xue [3 ]
机构
[1] Nankai Univ, Coll Comp Sci, Tianjin, Peoples R China
[2] Shanxi Univ, Taiyuan, Peoples R China
[3] China Mobile Res Inst, Beijing, Peoples R China
关键词
insider threat detection; anomaly detection; hierarchical fusion;
D O I
10.1007/978-3-031-44213-1_2
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Insider threats can cause serious damage to organizations and insider threat detection has received increasing attention from research and industries in recent years. Anomaly-based methods are one of the important approaches for insider threat detection. Existing anomaly-based methods usually detect anomalies in either the entire sample space or the individual user space. However, we argue that whether the behavior is anomalous depends on the corresponding contextual information and the context scope can have more granularities. Overall normal behavior may be anomalous within a specific department, while normal behavior within a department may be anomalous for a specific person. To this end, in this paper, we propose a novel insider threat detection method that explicitly models anomalies with hierarchical context scopes (i.e., organization, department, and person) and fuses them to compute anomaly scores. Comparisons with the unsupervised state-of-the-art approaches on the CMU CERT dataset demonstrate the effectiveness of the proposed method. Our method won the first prize in the CCF-BDCI competition.
引用
收藏
页码:13 / 25
页数:13
相关论文
共 50 条
  • [41] Anomaly-based intrusion detection system for IoT application
    Bhavsar M.
    Roy K.
    Kelly J.
    Olusola O.
    Discover Internet of Things, 2023, 3 (01):
  • [42] Exploring Feature Normalization and Temporal Information for Machine Learning Based Insider Threat Detection
    Ferreira, Pedro
    Le, Duc C.
    Zincir-Heywood, Nur
    2019 15TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT (CNSM), 2019,
  • [43] A Fusion Model Based on Dynamic Web Browsing Behavior Analysis for IoT Insider Threat Detection
    Wang, Jiarong
    Liu, Junyi
    Yan, Tian
    Xia, Mingshan
    Hong, Jianshu
    Zhou, Caiqiu
    SENSORS, 2022, 22 (17)
  • [44] Malicious insider threat detection using variation of sampling methods for anomaly detection in cloud environment
    Asha, S.
    Shanmugapriya, D.
    Padmavathi, G.
    COMPUTERS & ELECTRICAL ENGINEERING, 2023, 105
  • [45] XABA: A Zero-Knowledge Anomaly-Based Behavioral Analysis Method to Detect Insider Threats
    Zargar, Abolfazl
    Nowroozi, Alireza
    Jalili, Rasool
    2016 13TH INTERNATIONAL IRANIAN SOCIETY OF CRYPTOLOGY CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2016, : 26 - 31
  • [46] Anomaly-Based Intrusion Detection of Protocol-Aware Jamming
    Lichtman, Marc
    Reed, Jeffrey H.
    2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 269 - 274
  • [47] Anomaly-Based Intrusion Detection System for Ad hoc Networks
    Korba, Abdelaziz Amara
    Nafaa, Mehdi
    Ghamri-Doudane, Yacine
    2016 7TH INTERNATIONAL CONFERENCE ON THE NETWORK OF THE FUTURE (NOF), 2016,
  • [48] A Genetic Clustering Technique for Anomaly-Based Intrusion Detection Systems
    Aissa, Naila Belhadj
    Guerroumi, Mohamed
    2015 16TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2015, : 87 - 92
  • [49] Anomaly-based network intrusion detection: Techniques, systems and challenges
    Garcia-Teodoro, P.
    Diaz-Verdejo, J.
    Macia-Fernandez, G.
    Vazquez, E.
    COMPUTERS & SECURITY, 2009, 28 (1-2) : 18 - 28
  • [50] Anomaly-Based Risk Detection Using Digital News Articles
    Pointner, Andreas
    Spitzer, Eva-Maria
    Krauss, Oliver
    Stoeckl, Andreas
    INTELLIGENT SYSTEMS AND APPLICATIONS, VOL 1, 2023, 542 : 1 - 16