Supervised Learning for Insider Threat Detection Using Stream Mining

被引:32
|
作者
Parveen, Pallabi [1 ]
Weger, Zackary R. [1 ]
Thuraisingham, Bhavani [1 ]
Hamlen, Kevin [1 ]
Khan, Latifur [1 ]
机构
[1] Univ Texas Dallas, Dept Comp Sci, Richardson, TX 75083 USA
关键词
anomaly detection; support vector machine; insider threat; ensemble;
D O I
10.1109/ICTAI.2011.176
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Insider threat detection requires the identification of rare anomalies in contexts where evolving behaviors tend to mask such anomalies. This paper proposes and tests an ensemble-based stream mining algorithm based on supervised learning that addresses this challenge by maintaining an evolving collection of multiple models to classify dynamic data streams of unbounded length. The result is a classifier that exhibits substantially increased classification accuracy for real insider threat streams relative to traditional supervised learning (traditional SVM and one-class SVM) and other single-model approaches.
引用
收藏
页码:1032 / 1039
页数:8
相关论文
共 50 条
  • [31] An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning
    Hu, Teng
    Niu, Weina
    Zhang, Xiaosong
    Liu, Xiaolei
    Lu, Jiazhong
    Liu, Yuan
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [32] Anomaly Detection in Vehicle Traffic Data Using Batch and Stream Supervised Learning
    Faial, David
    Bernardini, Flavia
    Miranda, Leandro
    Viterbo, Jose
    PROGRESS IN ARTIFICIAL INTELLIGENCE, EPIA 2019, PT I, 2019, 11804 : 675 - 684
  • [33] Insider Threat Detection Based on NLP Word Embedding and Machine Learning
    Haq, Mohd Anul
    Khan, Mohd Abdul Rahim
    Alshehri, Mohammed
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 33 (01): : 619 - 635
  • [34] Research Opportunity of Insider Threat Detection based on Machine Learning Methods
    Prajitno, Noer Tjahja Moekthi
    Hadiyanto, H.
    Rochim, Adian Fatchur
    2023 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE IN INFORMATION AND COMMUNICATION, ICAIIC, 2023, : 292 - 296
  • [35] Learning Correlation Graph and Anomalous Employee Behavior for Insider Threat Detection
    Pratibha
    Wang, Junshan
    Aggarwal, Saurabh
    Ji, Feng
    Tay, Wee Peng
    2018 21ST INTERNATIONAL CONFERENCE ON INFORMATION FUSION (FUSION), 2018, : 595 - 601
  • [36] Using Dirichlet Marked Hawkes Processes for Insider Threat Detection
    Zheng, Panpan
    Yuan, Shuhan
    Wu, Xintao
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2022, 3 (01):
  • [37] Insider Threat Detection using an Artificial Immune system Algorithm
    Igbe, Obinna
    Saadawi, Tarek
    2018 9TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2018, : 297 - 302
  • [38] Insider Threat Detection Using a Graph-Based Approach
    Eberle, William
    Graves, Jeffrey
    Holder, Lawrence
    JOURNAL OF APPLIED SECURITY RESEARCH, 2010, 6 (01) : 32 - 81
  • [39] Use of Machine Learning in Big Data Analytics for Insider Threat Detection
    Mayhew, Michael
    Atighetchi, Michael
    Adler, Aaron
    Greenstadt, Rachel
    2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 915 - 922
  • [40] Insider threat Detection using Log analysis and Event Correlation
    Ambre, Amruta
    Shekokar, Narendra
    INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING TECHNOLOGIES AND APPLICATIONS (ICACTA), 2015, 45 : 436 - 445