Applying One-Class Algorithms for Data Stream-Based Insider Threat Detection

被引:5
|
作者
Peccatiello, Rafael Bruno [1 ]
Gondim, Joao Jose Costa [1 ]
Garcia, Luis Paulo Faina [1 ]
机构
[1] Univ Brasilia, Dept Comp Sci, BR-70910900 Brasilia, Brazil
关键词
Insider threat detection; data stream; machine learning; one-class classification; CLASSIFICATION; NETWORK;
D O I
10.1109/ACCESS.2023.3293825
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An insider threat is anyone who has legitimate access to a particular organization's network and uses that access to harm that organization. Insider threats may act with or without intent, but when they have an intention, they usually also have some specific motivation. This motivation can vary, including but not limited to personal discontent, financial issues, and coercion. It is hard to face insider threats with traditional security solutions because those solutions are limited to the signature detection paradigm. To overcome this restriction, researchers have proposed using Machine Learning which can address Insider Threat issues more comprehensively. Some of them have used batch learning, and others have used stream learning. Batch approaches are simpler to implement, but the problem is how to apply them in the real world. That is because real insider threat scenarios have complex characteristics to address by batch learning. Although more complex, stream approaches are more comprehensive and feasible to implement. Some studies have also used unsupervised and supervised Machine Learning techniques, but obtaining labeled samples makes it hard to implement fully supervised solutions. This study proposes a framework that combines different data science techniques to address insider threat detection. Among them are using semi-supervised and supervised machine learning, data stream analysis, and periodic retraining procedures. The algorithms used in the implementation were Isolation Forest, Elliptic Envelop, and Local Outlier Factor. This study evaluated the results according to the values obtained by the precision, recall, and F1-Score metrics. The best results were obtained by the ISOF algorithm, with 0.78 for the positive class (malign) recall and 0.80 for the negative class (benign) recall.
引用
收藏
页码:70560 / 70573
页数:14
相关论文
共 50 条
  • [31] A comparison of one-class classifiers for novelty detection in forensic case data
    Ratle, Frdcric
    Kanevski, Mikhail
    Terrettaz-Ziifferey, Anne-Laure
    Esseiva, Pierre
    Ribaux, Olivier
    INTELLIGENT DATA ENGINEERING AND AUTOMATED LEARNING - IDEAL 2007, 2007, 4881 : 67 - +
  • [32] Phishing detection using PSOAANN based One-Class Classifier
    Pandey, M.
    Ravi, V.
    2013 SIXTH INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING AND TECHNOLOGY (ICETET 2013), 2013, : 148 - 153
  • [33] Stream-Based Lossless Data Compression Applying Adaptive Entropy Coding for Hardware-Based Implementation
    Yamagiwa, Shinichi
    Hayakawa, Eisaku
    Marumo, Koichi
    ALGORITHMS, 2020, 13 (07)
  • [34] Active anomaly detection based on deep one-class classification
    Kim, Minkyung
    Kim, Junsik
    Yu, Jongmin
    Choi, Jun Kyun
    PATTERN RECOGNITION LETTERS, 2023, 167 : 18 - 24
  • [35] GS-TMS: A Global Stream-based Threat Monitor System
    Miao, Jiajia
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2008, 1 (02): : 1644 - 1651
  • [36] One-Class Support Vector Machine for Functional Data Novelty Detection
    Yao, Ma
    Wang, Huangang
    2012 THIRD GLOBAL CONGRESS ON INTELLIGENT SYSTEMS (GCIS 2012), 2012, : 172 - 175
  • [37] Landmine detection Improvement Using One-Class SVM for Unbalanced Data
    Tbarki, Khaoula
    Ben Said, Salma
    Ksantini, Riadh
    Lachiri, Zied
    2017 3RD INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR SIGNAL AND IMAGE PROCESSING (ATSIP), 2017, : 171 - 176
  • [38] Stream-Based Active Unusual Event Detection
    Loy, Chen Change
    Xiang, Tao
    Gong, Shaogang
    COMPUTER VISION-ACCV 2010, PT I, 2011, 6492 : 161 - 175
  • [39] ATDAD: One-class adversarial learning for tabular data anomaly detection
    Yang, Xiaohui
    Li, Xiang
    COMPUTERS & SECURITY, 2023, 134
  • [40] Insider threat detection using supervised machine learning algorithms
    Manoharan, Phavithra
    Yin, Jiao
    Wang, Hua
    Zhang, Yanchun
    Ye, Wenjie
    TELECOMMUNICATION SYSTEMS, 2024, 87 (04) : 899 - 915