Graph-based insider threat detection: A survey

被引:0
|
作者
Gong, Yiru [1 ,2 ]
Cui, Susu [1 ,2 ]
Liu, Song [1 ,2 ]
Jiang, Bo [1 ,2 ]
Dong, Cong [3 ]
Lu, Zhigang [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[3] Zhongguancun Lab, Beijing, Peoples R China
关键词
Insider threat analysis; Graph model; Anomaly detection; Cyber security;
D O I
10.1016/j.comnet.2024.110757
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Insider threat detection has been a significant topic in recent years. However, as network technology develops, the intranet becomes more complex. Therefore, simply matching attack patterns or using traditional machine learning methods (Logistic Regression, Gaussian-NB, Random Forest, etc.) does not work well. On the other hand, the graph structure can better adapt to intranet data, thus graph-based insider threat detection methods have become mainstream. In order to study the design and effectiveness of graph-based insider threat detection, in this paper, we conduct a systematic and comprehensive survey of existing related research. Specifically, we provide a framework and a taxonomy based on the detection process, classifying existing work from three aspects: data collection, graph construction, and graph anomaly detection. We conduct a quantitative analysis of existing representative graph methods and find that the models with more information have better performance. In particular, we discuss the scalability of existing methods to large-scale networks and their feasibility in real environments. Based on the survey results, we propose 7 pain points in this field and provide specific future research directions. Our survey will provide future researchers with a complete solution.
引用
收藏
页数:21
相关论文
共 50 条
  • [1] Insider Threat Detection Using a Graph-Based Approach
    Eberle, William
    Graves, Jeffrey
    Holder, Lawrence
    JOURNAL OF APPLIED SECURITY RESEARCH, 2010, 6 (01) : 32 - 81
  • [2] Insider Threat Detection Using Graph-Based Approaches
    Eberle, William
    Holder, Lawrence
    CATCH 2009: CYBERSECURITY APPLICATIONS AND TECHNOLOGY CONFERENCE FOR HOMELAND SECURITY, PROCEEDINGS, 2009, : 237 - +
  • [3] A Graph Based Framework for Malicious Insider Threat Detection
    Gamachchi, Anagi
    Sun, Li
    Boztas, Serdar
    PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 2638 - 2647
  • [4] Warder: Online Insider Threat Detection System Using Multi-Feature Modeling and Graph-Based Correlation
    Jiang, Jianguo
    Chen, Jiuming
    Gu, Tianbo
    Choo, Kim-Kwang Raymond
    Liu, Chao
    Yu, Min
    Huang, Weiqing
    Mohapatra, Prasant
    MILCOM 2019 - 2019 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2019,
  • [5] Applying Graph-Based Anomaly Detection Approaches to the Discovery of Insider Threats
    Eberle, William
    Holder, Lawrence
    ISI: 2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2009, : 206 - +
  • [6] A graph empowered insider threat detection framework based on daily activities
    Hong, Wei
    Yin, Jiao
    You, Mingshan
    Wang, Hua
    Cao, Jinli
    Li, Jianxin
    Liu, Ming
    Man, Chengyuan
    ISA TRANSACTIONS, 2023, 141 : 84 - 92
  • [7] A Graph Convolution Neural Network Based Method for Insider Threat Detection
    Fei, Kexiong
    Zhou, Jiang
    Su, Lin
    Wang, Weiping
    Chen, Yong
    Zhang, Fan
    2022 IEEE INTL CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, BIG DATA & CLOUD COMPUTING, SUSTAINABLE COMPUTING & COMMUNICATIONS, SOCIAL COMPUTING & NETWORKING, ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM, 2022, : 66 - 73
  • [8] Insider Threat Detection Through Attributed Graph Clustering
    Gamachchi, Anagi
    Boztas, Serdar
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 112 - 119
  • [9] Graph-based Anomaly Detection for Smart Cities: A Survey
    Sudrich, Simon
    Borges, Julio
    Beigl, Michael
    2017 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTED, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2017,
  • [10] Insider threat detection approach for tobacco industry based on heterogeneous graph embedding
    Ji, Qi
    Li, Wei
    Pan, Bailin
    Xue, Hongkai
    Qiu, Xiang
    High Technology Letters, 2024, 30 (02) : 199 - 210