Insider Threat Detection Based on Deep Clustering of Multi-Source Behavioral Events

被引:5
|
作者
Wang, Jiarong [1 ]
Sun, Qianran [1 ]
Zhou, Caiqiu [1 ]
机构
[1] Chinese Acad Sci, Inst High Energy Phys, Beijing 100049, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 24期
基金
中国国家自然科学基金;
关键词
insider threat; multi-source user behaviors; deep clustering;
D O I
10.3390/app132413021
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
With the continuous advancement of enterprise digitization, insider threats have become one of the primary cybersecurity concerns for organizations. Therefore, it is of great significance to develop an effective insider threat detection mechanism to ensure the security of enterprises. Most methods rely on artificial feature engineering and input the extracted user behavior features into a clustering-based unsupervised machine learning model for insider threat detection. However, feature extraction is independent of clustering-based unsupervised machine learning. As a result, user behavior features are not the most appropriate for clustering-based unsupervised machine learning, and thus, they reduce the insider threat detection accuracy. This paper proposes an insider threat detection method based on the deep clustering of multi-source behavioral events. On the one hand, the proposed method constructs an end-to-end deep clustering network and automatically learns the user behavior feature expression from multi-source behavioral event sequences. On the other hand, a deep clustering objective function is presented to jointly optimize the learning of feature representations and the clustering task for insider threat detection. This optimization can adjust the optimal user behavior features for the clustering model to improve the insider threat detection accuracy. The experimental results show that the proposed end-to-end insider threat detection model can accurately identify insider threats based on abnormal multi-source user behaviors in enterprise networks.
引用
收藏
页数:17
相关论文
共 50 条
  • [41] Multi-source Manifold Outlier Detection
    Zhang, Lei
    Wang, Shupeng
    Fu, Ge
    Wang, Zhenyu
    Cui, Lei
    Hou, Junteng
    COMPUTATIONAL SCIENCE - ICCS 2019, PT II, 2019, 11537 : 44 - 58
  • [42] MPDFF: Multi-source Pedestrian detection based on Feature Fusion
    Meng, Lingxuan
    Zhou, Ji
    Ma, Jin
    Wang, Ziwei
    2022 IEEE INTERNATIONAL GEOSCIENCE AND REMOTE SENSING SYMPOSIUM (IGARSS 2022), 2022, : 7906 - 7909
  • [43] UAV-Based Vehicle Detection by Multi-source Images
    Jiang, Shangjie
    Luo, Bin
    Liu, Jun
    Zhang, Yun
    Zhang, LiangPei
    COMPUTER VISION, PT III, 2017, 773 : 38 - 49
  • [44] A Deep Learning Model for Oceanic Mesoscale Eddy Detection Based on Multi-source Remote Sensing Imagery
    Liu, Yingjie
    Li, Xiaofeng
    Ren, Yibin
    IGARSS 2020 - 2020 IEEE INTERNATIONAL GEOSCIENCE AND REMOTE SENSING SYMPOSIUM, 2020, : 6762 - 6765
  • [45] An Effective Insider Threat Detection Apporoach Based on BPNN
    Tao, Xiaoling
    Liu, Runrong
    Fu, Lianyou
    Qiu, Qiqi
    Yu, Yuelin
    Zhang, Haijing
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2022), PT I, 2022, 13471 : 231 - 243
  • [46] Graph-based insider threat detection: A survey
    Gong, Yiru
    Cui, Susu
    Liu, Song
    Jiang, Bo
    Dong, Cong
    Lu, Zhigang
    COMPUTER NETWORKS, 2024, 254
  • [47] Multi-source homogeneous data clustering for multi-target detection from cluttered background with misdetection
    Li, Tiancheng
    De la Prieta Pintado, Fernando
    Corchado, Juan M.
    Bajo, Javier
    APPLIED SOFT COMPUTING, 2017, 60 : 436 - 446
  • [48] Defects Clustering for Mineral Sintering Surface Based on Multi-source Data Fusion
    Yang, Yi
    Chen, Tengtuo
    Zhao, Liang
    Gu, Jiaying
    Tang, Xiaoyu
    Zhang, Yangqianhui
    2023 2ND CONFERENCE ON FULLY ACTUATED SYSTEM THEORY AND APPLICATIONS, CFASTA, 2023, : 670 - 674
  • [49] A Graph Based Framework for Malicious Insider Threat Detection
    Gamachchi, Anagi
    Sun, Li
    Boztas, Serdar
    PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 2638 - 2647
  • [50] Machine learning based Insider Threat Modelling and Detection
    Le, Duc C.
    Zincir-Heywood, A. Nur
    2019 IFIP/IEEE SYMPOSIUM ON INTEGRATED NETWORK AND SERVICE MANAGEMENT (IM), 2019,