An improved feature extraction algorithm for insider threat using hidden Markov model on user behavior detection

被引:11
|
作者
Ye, Xiaoyun [1 ]
Han, Myung-Mook [2 ]
机构
[1] Gachon Univ, Dept Comp Sci, Seongnam, South Korea
[2] Gachon Univ, Dept Software, Seongnam, South Korea
基金
新加坡国家研究基金会;
关键词
Hidden Markov model; Insider threat detection; Viterbi algorithm; Anomaly detection;
D O I
10.1108/ICS-12-2019-0142
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Purpose By using a new feature extraction method on the Cert data set and using a hidden Markov model (HMM) to model and analyze the behavior of users to distinguish whether the behavior is normal within a continuous period. Design/methodology/approach Feature extraction of five parts of the time series by rules and sorting in chronological order. Use the obtained features to calculate the probability parameters required by the HMM model and establish a behavior model for each user. When the user has abnormal behavior, the model will return a very low probability value to distinguish between normal and abnormal information. Findings Generally, HMM parameters are obtained by supervised learning and unsupervised learning, but the hidden state cannot be clearly defined. When the hidden state is determined according to the data set, the accuracy of the model will be improved. Originality/value This paper proposes a new feature extraction method and analysis mode, which determines the shape of the hidden state according to the situation of the data set, making subsequent HMM modeling simple and efficient and in turn improving the accuracy of user behavior detection.
引用
收藏
页码:19 / 36
页数:18
相关论文
共 50 条
  • [31] TOWARDS A USER AND ROLE-BASED BEHAVIOR ANALYSIS METHOD FOR INSIDER THREAT DETECTION
    Lv, Qiujian
    Wang, Yan
    Wang, Leigi
    Wang, Dan
    PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT (IEEE IC-NIDC), 2018, : 6 - 10
  • [32] User Behaviour based Insider Threat Detection using a Hybrid Learning Approach
    Singh M.
    Mehtre B.M.
    Sangeetha S.
    Govindaraju V.
    Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (04) : 4573 - 4593
  • [33] A handwritten digit recognition algorithm using two-dimensional hidden markov models for feature extraction
    Wierer, Jay
    Boston, Nigel
    2007 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL II, PTS 1-3, 2007, : 505 - +
  • [34] Dynamic mode decomposition: A feature extraction technique based hidden Markov model for detection of Mysticetes' vocalisations
    Ogundile, O. O.
    Usman, A. M.
    Babalola, O. P.
    Versfeld, D. J. J.
    ECOLOGICAL INFORMATICS, 2021, 63
  • [35] Feature compensation algorithm based on hidden Markov model and parallel model combination
    Lü, Yong
    Wu, Zhenyang
    Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition), 2009, 39 (05): : 889 - 893
  • [36] Multiuser Detection Using Hidden Markov Model
    Chen, Fangjiong
    Kwong, Sam
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2009, 58 (01) : 107 - 115
  • [37] Detection of baleen whale species using kernel dynamic mode decomposition-based feature extraction with a hidden Markov model
    Usman, A. M.
    Versfeld, D. J. J.
    ECOLOGICAL INFORMATICS, 2022, 71
  • [38] Gesture Recognition Using Improved Hierarchical Hidden Markov Algorithm
    Lian, Kuang-Yow
    Lin, Ben-Huang
    2013 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC 2013), 2013, : 1738 - 1742
  • [39] Keystroke Biometric User Verification Using Hidden Markov Model
    Ali, Md Liakat
    Thakur, Kutub
    Tappert, Charles C.
    Qiu, Meikang
    2016 IEEE 3RD INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2016, : 204 - 209
  • [40] Shape classification using Hidden Markov Model and structural feature
    Xie, Bangwang
    Wang, Zhiyong
    Wang, Jiajun
    MIPPR 2007: PATTERN RECOGNITION AND COMPUTER VISION, 2007, 6788