Graph-based insider threat detection: A survey

被引:0
|
作者
Gong, Yiru [1 ,2 ]
Cui, Susu [1 ,2 ]
Liu, Song [1 ,2 ]
Jiang, Bo [1 ,2 ]
Dong, Cong [3 ]
Lu, Zhigang [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[3] Zhongguancun Lab, Beijing, Peoples R China
关键词
Insider threat analysis; Graph model; Anomaly detection; Cyber security;
D O I
10.1016/j.comnet.2024.110757
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Insider threat detection has been a significant topic in recent years. However, as network technology develops, the intranet becomes more complex. Therefore, simply matching attack patterns or using traditional machine learning methods (Logistic Regression, Gaussian-NB, Random Forest, etc.) does not work well. On the other hand, the graph structure can better adapt to intranet data, thus graph-based insider threat detection methods have become mainstream. In order to study the design and effectiveness of graph-based insider threat detection, in this paper, we conduct a systematic and comprehensive survey of existing related research. Specifically, we provide a framework and a taxonomy based on the detection process, classifying existing work from three aspects: data collection, graph construction, and graph anomaly detection. We conduct a quantitative analysis of existing representative graph methods and find that the models with more information have better performance. In particular, we discuss the scalability of existing methods to large-scale networks and their feasibility in real environments. Based on the survey results, we propose 7 pain points in this field and provide specific future research directions. Our survey will provide future researchers with a complete solution.
引用
收藏
页数:21
相关论文
共 50 条
  • [31] Insider Threat Detection in PRODIGAL
    Goldberg, Henry G.
    Young, William T.
    Reardon, Matthew G.
    Phillips, Brian J.
    Senator, Ted E.
    PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 2648 - 2657
  • [32] Graph-based Malware Distributors Detection
    Venzhega, Andrei
    Zhinalieva, Polina
    Suboch, Nikolay
    PROCEEDINGS OF THE 22ND INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'13 COMPANION), 2013, : 1141 - 1144
  • [33] Geosocial Graph-Based Community Detection
    van Gennip, Yves
    Hu, Huiyi
    Hunter, Blake
    Porter, Mason A.
    12TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW 2012), 2012, : 754 - 758
  • [34] A graph-based algorithm for cluster detection
    Foggia, Pasquale
    Percannella, Gennaro
    Sansone, Carlo
    Vento, Mario
    INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2008, 22 (05) : 843 - 860
  • [35] Graph-based Rare Category Detection
    He, Jingrui
    Liu, Yan
    Lawrence, Richard
    ICDM 2008: EIGHTH IEEE INTERNATIONAL CONFERENCE ON DATA MINING, PROCEEDINGS, 2008, : 833 - +
  • [36] Survey on Knowledge Graph-Based Recommendation Methods
    Luo, Chengtian
    Ye, Xia
    Computer Engineering and Applications, 2023, 59 (01) : 49 - 60
  • [37] Research on Graph-Based Point Cloud: A Survey
    Liang, Xun
    Li, Zhiying
    Jiang, Hongxun
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2024, 61 (11): : 2870 - 2896
  • [38] A Survey on Graph-based Systems in Manufacturing Processes
    Weise, Jens
    Benkhardt, Steven
    Mostaghim, Sanaz
    2018 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI), 2018, : 112 - 119
  • [39] Graph-based Arabic NLP Techniques: A Survey
    Etaiwi, Wael
    Awajan, Arafat
    ARABIC COMPUTATIONAL LINGUISTICS, 2018, 142 : 328 - 333
  • [40] Graph-based Methods for Ontology Summarization: A Survey
    Pouriyeh, Seyedamin
    Allahyari, Mehdi
    Liu, Qingxia
    Cheng, Gong
    Arabnia, Hamid Reza
    Atzori, Maurizio
    Kochut, Krys
    2018 IEEE FIRST INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND KNOWLEDGE ENGINEERING (AIKE), 2018, : 85 - 92