Applying One-Class Algorithms for Data Stream-Based Insider Threat Detection

被引:5
|
作者
Peccatiello, Rafael Bruno [1 ]
Gondim, Joao Jose Costa [1 ]
Garcia, Luis Paulo Faina [1 ]
机构
[1] Univ Brasilia, Dept Comp Sci, BR-70910900 Brasilia, Brazil
关键词
Insider threat detection; data stream; machine learning; one-class classification; CLASSIFICATION; NETWORK;
D O I
10.1109/ACCESS.2023.3293825
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An insider threat is anyone who has legitimate access to a particular organization's network and uses that access to harm that organization. Insider threats may act with or without intent, but when they have an intention, they usually also have some specific motivation. This motivation can vary, including but not limited to personal discontent, financial issues, and coercion. It is hard to face insider threats with traditional security solutions because those solutions are limited to the signature detection paradigm. To overcome this restriction, researchers have proposed using Machine Learning which can address Insider Threat issues more comprehensively. Some of them have used batch learning, and others have used stream learning. Batch approaches are simpler to implement, but the problem is how to apply them in the real world. That is because real insider threat scenarios have complex characteristics to address by batch learning. Although more complex, stream approaches are more comprehensive and feasible to implement. Some studies have also used unsupervised and supervised Machine Learning techniques, but obtaining labeled samples makes it hard to implement fully supervised solutions. This study proposes a framework that combines different data science techniques to address insider threat detection. Among them are using semi-supervised and supervised machine learning, data stream analysis, and periodic retraining procedures. The algorithms used in the implementation were Isolation Forest, Elliptic Envelop, and Local Outlier Factor. This study evaluated the results according to the values obtained by the precision, recall, and F1-Score metrics. The best results were obtained by the ISOF algorithm, with 0.78 for the positive class (malign) recall and 0.80 for the negative class (benign) recall.
引用
收藏
页码:70560 / 70573
页数:14
相关论文
共 50 条
  • [1] Adaptive One-Class Ensemble-based Anomaly Detection: An Application to Insider Threats
    Haidar, Diana
    Gaber, Mohamed Medhat
    2018 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2018,
  • [2] Intrusion Detection Based on One-class SVM and SNMP MIB data
    Bao Cui-Mei
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 346 - 349
  • [3] Transfer learning-based one-class dictionary learning for recommendation data stream
    Xie, Haoxin
    Liu, Bo
    Xiao, Yanshan
    INFORMATION SCIENCES, 2021, 547 : 526 - 538
  • [4] Evaluation of one-class algorithms for anomaly detection in home networks
    de Melo, Pedro H. A. D.
    Martins de Resende, Adriano Araujo
    Miani, Rodrigo Sanches
    Rosa, Pedro Frosi
    2021 IEEE 33RD INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI 2021), 2021, : 682 - 689
  • [5] Applying one-class learning algorithms to predict phage-bacteria interactions
    Fernando Lopez, Juan
    Lopez Sotelo, Jesus Alfonso
    Leite, Diogo
    Pena-Reyes, Carlos
    2019 IEEE LATIN AMERICAN CONFERENCE ON COMPUTATIONAL INTELLIGENCE (LA-CCI), 2019, : 63 - 68
  • [6] ThunderSecure: deploying real-time intrusion detection for 100G research networks by leveraging stream-based features and one-class classification network
    Gong, Qian
    DeMar, Phil
    Altunay, Mine
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2022, 21 (04) : 799 - 812
  • [7] ThunderSecure: deploying real-time intrusion detection for 100G research networks by leveraging stream-based features and one-class classification network
    Qian Gong
    Phil DeMar
    Mine Altunay
    International Journal of Information Security, 2022, 21 : 799 - 812
  • [8] One-Class Learning for Data Stream Through Graph Neural Networks
    Silva Golo, Marcos Paulo
    Gama, Joao
    Marcacini, Ricardo Marcondes
    INTELLIGENT SYSTEMS, BRACIS 2024, PT IV, 2025, 15415 : 61 - 75
  • [9] Insider Threat Detection Based on User Behavior Modeling and Anomaly Detection Algorithms
    Kim, Junhong
    Park, Minsik
    Kim, Haedong
    Cho, Suhyoun
    Kang, Pilsung
    APPLIED SCIENCES-BASEL, 2019, 9 (19):
  • [10] Path Algorithms for One-Class SVM
    Zhou, Liang
    Li, Fuxin
    Yang, Yanwu
    ADVANCES IN NEURAL NETWORKS - ISNN 2008, PT I, PROCEEDINGS, 2008, 5263 : 645 - 654