Insider Threat Detection Based on Deep Clustering of Multi-Source Behavioral Events

被引:5
|
作者
Wang, Jiarong [1 ]
Sun, Qianran [1 ]
Zhou, Caiqiu [1 ]
机构
[1] Chinese Acad Sci, Inst High Energy Phys, Beijing 100049, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 24期
基金
中国国家自然科学基金;
关键词
insider threat; multi-source user behaviors; deep clustering;
D O I
10.3390/app132413021
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
With the continuous advancement of enterprise digitization, insider threats have become one of the primary cybersecurity concerns for organizations. Therefore, it is of great significance to develop an effective insider threat detection mechanism to ensure the security of enterprises. Most methods rely on artificial feature engineering and input the extracted user behavior features into a clustering-based unsupervised machine learning model for insider threat detection. However, feature extraction is independent of clustering-based unsupervised machine learning. As a result, user behavior features are not the most appropriate for clustering-based unsupervised machine learning, and thus, they reduce the insider threat detection accuracy. This paper proposes an insider threat detection method based on the deep clustering of multi-source behavioral events. On the one hand, the proposed method constructs an end-to-end deep clustering network and automatically learns the user behavior feature expression from multi-source behavioral event sequences. On the other hand, a deep clustering objective function is presented to jointly optimize the learning of feature representations and the clustering task for insider threat detection. This optimization can adjust the optimal user behavior features for the clustering model to improve the insider threat detection accuracy. The experimental results show that the proposed end-to-end insider threat detection model can accurately identify insider threats based on abnormal multi-source user behaviors in enterprise networks.
引用
收藏
页数:17
相关论文
共 50 条
  • [1] Behavioral Based Insider Threat Detection Using Deep Learning
    Nasir, Rida
    Afzal, Mehreen
    Latif, Rabia
    Iqbal, Waseem
    IEEE ACCESS, 2021, 9 : 143266 - 143274
  • [2] Doc2vec-based Insider Threat Detection through Behaviour Analysis of Multi-source Security Logs
    Liu, Liu
    Chen, Chao
    Zhang, Jun
    De Vel, Olivier
    Xiang, Yang
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 301 - 309
  • [3] Insider Threat Identification Using the Simultaneous Neural Learning of Multi-Source Logs
    Liu, Liu
    Chen, Chao
    Zhang, Jun
    De Vel, Olivier
    Xiang, Yang
    IEEE ACCESS, 2019, 7 : 183162 - 183176
  • [4] Multi-Source Clustering based on spectral recovery
    Yin, Hongwei
    Li, Fanzhang
    Zhang, Li
    2018 24TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION (ICPR), 2018, : 231 - 236
  • [5] A Novel Multi-source Vehicle Detection Algorithm based on Deep Learning
    He, Yong
    Li, Liangqun
    PROCEEDINGS OF 2018 14TH IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING (ICSP), 2018, : 979 - 982
  • [6] Multi-source Data Clustering
    Li, Tiancheng
    Corchado, Juan M.
    Bajo, Javier
    Sun, Shudong
    2015 18TH INTERNATIONAL CONFERENCE ON INFORMATION FUSION (FUSION), 2015, : 830 - 837
  • [7] Insider Threat Detection with Deep Neural Network
    Yuan, Fangfang
    Cao, Yanan
    Shang, Yanmin
    Liu, Yanbing
    Tan, Jianlong
    Fang, Binxing
    COMPUTATIONAL SCIENCE - ICCS 2018, PT I, 2018, 10860 : 43 - 54
  • [8] Network threat detection based on correlation analysis of multi-platform multi-source alert data
    Xindai Lu
    Jiajia Han
    Qianbo Ren
    Hua Dai
    Jiyuan Li
    Jing Ou
    Multimedia Tools and Applications, 2020, 79 : 33349 - 33363
  • [9] Network threat detection based on correlation analysis of multi-platform multi-source alert data
    Lu, Xindai
    Han, Jiajia
    Ren, Qianbo
    Dai, Hua
    Li, Jiyuan
    Ou, Jing
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (45-46) : 33349 - 33363
  • [10] Insider Threat Detection Through Attributed Graph Clustering
    Gamachchi, Anagi
    Boztas, Serdar
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 112 - 119