Graph-based insider threat detection: A survey

被引:0
|
作者
Gong, Yiru [1 ,2 ]
Cui, Susu [1 ,2 ]
Liu, Song [1 ,2 ]
Jiang, Bo [1 ,2 ]
Dong, Cong [3 ]
Lu, Zhigang [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[3] Zhongguancun Lab, Beijing, Peoples R China
关键词
Insider threat analysis; Graph model; Anomaly detection; Cyber security;
D O I
10.1016/j.comnet.2024.110757
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Insider threat detection has been a significant topic in recent years. However, as network technology develops, the intranet becomes more complex. Therefore, simply matching attack patterns or using traditional machine learning methods (Logistic Regression, Gaussian-NB, Random Forest, etc.) does not work well. On the other hand, the graph structure can better adapt to intranet data, thus graph-based insider threat detection methods have become mainstream. In order to study the design and effectiveness of graph-based insider threat detection, in this paper, we conduct a systematic and comprehensive survey of existing related research. Specifically, we provide a framework and a taxonomy based on the detection process, classifying existing work from three aspects: data collection, graph construction, and graph anomaly detection. We conduct a quantitative analysis of existing representative graph methods and find that the models with more information have better performance. In particular, we discuss the scalability of existing methods to large-scale networks and their feasibility in real environments. Based on the survey results, we propose 7 pain points in this field and provide specific future research directions. Our survey will provide future researchers with a complete solution.
引用
收藏
页数:21
相关论文
共 50 条
  • [41] A Survey on Knowledge Graph-Based Recommender Systems
    Guo, Qingyu
    Zhuang, Fuzhen
    Qin, Chuan
    Zhu, Hengshu
    Xie, Xing
    Xiong, Hui
    He, Qing
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2022, 34 (08) : 3549 - 3568
  • [42] Research on insider threat detection method based on variational autoencoding
    Zhang, Zhenjiang
    Zhao, Lulu
    Zhang, Yang
    Zhou, Hongde
    Li, Wei
    Journal of Computers (Taiwan), 2021, 32 (04) : 201 - 210
  • [43] Dynamic Insider Threat Detection Based on Adaptable Genetic Programming
    Le, Duc C.
    Zincir-Heywood, A. Nur
    Heywood, Malcolm I.
    2019 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI 2019), 2019, : 2579 - 2586
  • [44] An insider threat detection method based on business process mining
    Zhu, Taiming
    Guo, Yuanbo
    Ju, Ankang
    Ma, Jun
    Wang, Xuan
    International Journal of Business Data Communications and Networking, 2017, 13 (02): : 83 - 98
  • [45] Business Process Mining based Insider Threat Detection System
    Zhu, Taiming
    Guo, Yuanbo
    Ma, Jun
    Ju, Ankang
    ADVANCES ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING, 2017, 1 : 467 - 478
  • [46] Anomaly Detection in Graph-Based Data Utilizing Graph Topology
    University of Miami, Department of Industrial & Systems Engineering, 1251 Memorial Drive, Coral Gables
    FL
    33146, United States
    Proc. Annu. Reliab. Maintainability Symp.,
  • [47] Insider Threat Detection Based on Adaptive Optimization by Grid Search
    Zhang, Jiange
    Chen, Yue
    Yang, Kuiwu
    Zhao, Jian
    Yan, Xincheng
    2019 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2019, : 173 - 175
  • [48] Anomaly Detection in Graph-Based Data Utilizing Graph Topology
    Ahmed, Ibrahim A.
    Moghaddass, Ramin
    2024 ANNUAL RELIABILITY AND MAINTAINABILITY SYMPOSIUM, RAMS, 2024,
  • [49] An Insider Threat Detection Method Based on User Behavior Analysis
    Jiang, Wei
    Tian, Yuan
    Liu, Weixin
    Liu, Wenmao
    INTELLIGENT INFORMATION PROCESSING IX, 2018, 538 : 421 - 429
  • [50] Behavioral Based Insider Threat Detection Using Deep Learning
    Nasir, Rida
    Afzal, Mehreen
    Latif, Rabia
    Iqbal, Waseem
    IEEE ACCESS, 2021, 9 : 143266 - 143274