An improved feature extraction algorithm for insider threat using hidden Markov model on user behavior detection

被引:11
|
作者
Ye, Xiaoyun [1 ]
Han, Myung-Mook [2 ]
机构
[1] Gachon Univ, Dept Comp Sci, Seongnam, South Korea
[2] Gachon Univ, Dept Software, Seongnam, South Korea
基金
新加坡国家研究基金会;
关键词
Hidden Markov model; Insider threat detection; Viterbi algorithm; Anomaly detection;
D O I
10.1108/ICS-12-2019-0142
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Purpose By using a new feature extraction method on the Cert data set and using a hidden Markov model (HMM) to model and analyze the behavior of users to distinguish whether the behavior is normal within a continuous period. Design/methodology/approach Feature extraction of five parts of the time series by rules and sorting in chronological order. Use the obtained features to calculate the probability parameters required by the HMM model and establish a behavior model for each user. When the user has abnormal behavior, the model will return a very low probability value to distinguish between normal and abnormal information. Findings Generally, HMM parameters are obtained by supervised learning and unsupervised learning, but the hidden state cannot be clearly defined. When the hidden state is determined according to the data set, the accuracy of the model will be improved. Originality/value This paper proposes a new feature extraction method and analysis mode, which determines the shape of the hidden state according to the situation of the data set, making subsequent HMM modeling simple and efficient and in turn improving the accuracy of user behavior detection.
引用
收藏
页码:19 / 36
页数:18
相关论文
共 50 条
  • [21] BRITD: behavior rhythm insider threat detection with time awareness and user adaptation
    Song, Shuang
    Gao, Neng
    Zhang, Yifei
    Ma, Cunqing
    CYBERSECURITY, 2024, 7 (01)
  • [22] Mining user cross-domain behavior patterns for insider threat detection
    Wen Y.
    Wang W.-P.
    Meng D.
    1600, Science Press (39): : 1555 - 1569
  • [23] Insider Threat Detection Model Using Anomaly-Based Isolation Forest Algorithm
    Al-Shehari, Taher
    Al-Razgan, Muna
    Alfakih, Taha
    Alsowail, Rakan A.
    Pandiaraj, Saravanan
    IEEE ACCESS, 2023, 11 : 118170 - 118185
  • [24] Information extraction algorithm based on multiple templates using hidden Markov model
    College of Information Technology, Jiangxi University of Finance and Economy, Nanchang 330013, China
    不详
    不详
    Jisuanji Gongcheng, 2006, 2 (203-205):
  • [25] Insider Threat Detection using an Artificial Immune system Algorithm
    Igbe, Obinna
    Saadawi, Tarek
    2018 9TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2018, : 297 - 302
  • [26] Network User Behavior Authentication Based on Hidden Markov Model
    Wu, Zenan
    Tian, Liqin
    Wang, Zhigang
    Wang, Yan
    2021 IEEE INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND SOFTWARE ENGINEERING (ICICSE 2021), 2021, : 76 - 82
  • [27] An Improved Hidden Markov Model for Anomaly Detection Using Frequent Common Patterns
    Sultana, Afroza
    Hamou-Lhadj, Abdelwahab
    Couture, Mario
    2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012,
  • [28] Feature learning for a hidden Markov model approach to landmine detection
    Zhang, Xuping
    Gader, Paul
    Frigui, Hichem
    DETECTION AND REMEDIATION TECHNOLOGIES FOR MINES AND MINELIKE TARGETS XII, 2007, 6553
  • [29] Feature extraction for bearing prognostics based on continuous hidden Markov model
    Kang Jianshe
    Zhang Xinghui
    Zhao Jinsong
    Xiao Lei
    ENGINEERING AND MANUFACTURING TECHNOLOGIES, 2014, 541-542 : 1483 - +
  • [30] Detection and Prediction of Abnormal Behavior Based on User Profile in Ubiquitous Home Network Using Hierarchical Hidden Markov Model
    Shin, Jaewan
    Shin, Dongkyoo
    Shin, Dongil
    Kim, Cheonsik
    Park, Jonghyuk
    SENSOR LETTERS, 2013, 11 (09) : 1814 - 1819