Graph-based insider threat detection: A survey

被引:0
|
作者
Gong, Yiru [1 ,2 ]
Cui, Susu [1 ,2 ]
Liu, Song [1 ,2 ]
Jiang, Bo [1 ,2 ]
Dong, Cong [3 ]
Lu, Zhigang [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[3] Zhongguancun Lab, Beijing, Peoples R China
关键词
Insider threat analysis; Graph model; Anomaly detection; Cyber security;
D O I
10.1016/j.comnet.2024.110757
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Insider threat detection has been a significant topic in recent years. However, as network technology develops, the intranet becomes more complex. Therefore, simply matching attack patterns or using traditional machine learning methods (Logistic Regression, Gaussian-NB, Random Forest, etc.) does not work well. On the other hand, the graph structure can better adapt to intranet data, thus graph-based insider threat detection methods have become mainstream. In order to study the design and effectiveness of graph-based insider threat detection, in this paper, we conduct a systematic and comprehensive survey of existing related research. Specifically, we provide a framework and a taxonomy based on the detection process, classifying existing work from three aspects: data collection, graph construction, and graph anomaly detection. We conduct a quantitative analysis of existing representative graph methods and find that the models with more information have better performance. In particular, we discuss the scalability of existing methods to large-scale networks and their feasibility in real environments. Based on the survey results, we propose 7 pain points in this field and provide specific future research directions. Our survey will provide future researchers with a complete solution.
引用
收藏
页数:21
相关论文
共 50 条
  • [21] Learning Correlation Graph and Anomalous Employee Behavior for Insider Threat Detection
    Pratibha
    Wang, Junshan
    Aggarwal, Saurabh
    Ji, Feng
    Tay, Wee Peng
    2018 21ST INTERNATIONAL CONFERENCE ON INFORMATION FUSION (FUSION), 2018, : 595 - 601
  • [22] A Survey of Graph-Based Deep Learning for Anomaly Detection in Distributed Systems
    Pazho, Armin Danesh
    Noghre, Ghazal Alinezhad
    Purkayastha, Arnab A.
    Vempati, Jagannadh
    Martin, Otto
    Tabkhi, Hamed
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2024, 36 (01) : 1 - 20
  • [23] TDLens: Toward an Empirical Evaluation of Provenance Graph-Based Approach to Cyber Threat Detection
    Rui Mei
    Hanbing Yan
    Qinqin Wang
    Zhihui Han
    Zhuohang Lyu
    China Communications, 2022, 19 (10) : 102 - 115
  • [24] TDLens: Toward an Empirical Evaluation of Provenance Graph-Based Approach to Cyber Threat Detection
    Mei, Rui
    Yan, Hanbing
    Wang, Qinqin
    Han, Zhihui
    Lyu, Zhuohang
    CHINA COMMUNICATIONS, 2022, 19 (10) : 102 - 115
  • [25] Graph-based visual analytics for cyber threat intelligence
    Boehm, Fabian
    Menges, Florian
    Pernul, Guenther
    CYBERSECURITY, 2018, 1 (01):
  • [26] A heterogeneous graph-based approach for cyber threat attribution using threat intelligence
    Duan, Junting
    Luo, Yujie
    Zhang, Zhicheng
    Peng, Jianjian
    2024 16TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND COMPUTING, ICMLC 2024, 2024, : 87 - 93
  • [27] An Effective Insider Threat Detection Apporoach Based on BPNN
    Tao, Xiaoling
    Liu, Runrong
    Fu, Lianyou
    Qiu, Qiqi
    Yu, Yuelin
    Zhang, Haijing
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2022), PT I, 2022, 13471 : 231 - 243
  • [28] Machine learning based Insider Threat Modelling and Detection
    Le, Duc C.
    Zincir-Heywood, A. Nur
    2019 IFIP/IEEE SYMPOSIUM ON INTEGRATED NETWORK AND SERVICE MANAGEMENT (IM), 2019,
  • [29] Unsupervised Ensemble based Learning for Insider Threat Detection
    Parveen, Pallabi
    McDaniel, Nate
    Hariharan, Varun S.
    Thuraisingham, Bhavani
    Khan, Latifur
    PROCEEDINGS OF 2012 ASE/IEEE INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY, RISK AND TRUST AND 2012 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM/PASSAT 2012), 2012, : 718 - 727
  • [30] Insider threat detection for specific threat scenarios
    Tian Tian
    Chen Zhang
    Bo Jiang
    Huamin Feng
    Zhigang Lu
    Cybersecurity, 8 (1)