Poisson-Based Anomaly Detection for Identifying Malicious User Behaviour

被引:6
|
作者
Sapegin, Andrey [1 ]
Amirkhanyan, Aragats [1 ]
Gawron, Marian [1 ]
Cheng, Feng [1 ]
Meinel, Christoph [1 ]
机构
[1] Univ Potsdam, Hasso Plattner Inst, D-14440 Potsdam, Germany
关键词
Anomaly detection; Intrusion detection; User behaviour; Authentication;
D O I
10.1007/978-3-319-25744-0_12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, malicious user behaviour that does not trigger access violation or alert of data leak is difficult to be detected. Using the stolen login credentials the intruder doing espionage will first try to stay undetected: silently collect data from the company network and use only resources he is authorised to access. To deal with such cases, a Poisson-based anomaly detection algorithm is proposed in this paper. Two extra measures make it possible to achieve high detection rates and meanwhile reduce number of false positive alerts: (1) checking probability first for the group, and then for single users and (2) selecting threshold automatically. To prove the proposed approach, we developed a special simulation testbed that emulates user behaviour in the virtual network environment. The proof-of-concept implementation has been integrated into our prototype of a SIEM system - Real-time Event Analysis and Monitoring System, where the emulated Active Directory logs from Microsoft Windows domain are extracted and normalised into Object Log Format for further processing and anomaly detection. The experimental results show that our algorithm was able to detect all events related to malicious activity and produced zero false positive results. Forethought as the module for our self-developed SIEM system based on the SAP HANA in-memory database, our solution is capable of processing high volumes of data and shows high efficiency on experimental dataset.
引用
收藏
页码:134 / 150
页数:17
相关论文
共 50 条
  • [1] Anomaly Detection for Individual Sequences with Applications in Identifying Malicious Tools
    Siboni, Shachar
    Cohen, Asaf
    [J]. ENTROPY, 2020, 22 (06)
  • [2] Poisson-based curve blending
    Lei, Kaibin
    Xu, Dong
    Wang, Qing
    Bao, Hujun
    [J]. Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao/Journal of Computer-Aided Design and Computer Graphics, 2007, 19 (03): : 298 - 303
  • [3] User Behaviour Anomaly Detection in Multidimensional Data
    Prarthana, T. S.
    Gangadhar, N. D.
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING IN EMERGING MARKETS (CCEM 2017), 2017, : 3 - 10
  • [4] Poisson-based Tools for Flow Visualization
    Esturo, Janick Martinez
    Schulze, Maik
    Roessl, Christian
    Theisel, Holger
    [J]. 2013 IEEE SYMPOSIUM ON PACIFIC VISUALIZATION (PACIFICVIS), 2013, : 241 - 248
  • [5] Some Poisson-Based Processes at Geometric Times
    Alessandra Meoli
    [J]. Journal of Statistical Physics, 190
  • [6] An ensemble-based framework for user behaviour anomaly detection and classification for cybersecurity
    Gianluigi Folino
    Carla Otranto Godano
    Francesco Sergio Pisani
    [J]. The Journal of Supercomputing, 2023, 79 : 11660 - 11683
  • [7] An ensemble-based framework for user behaviour anomaly detection and classification for cybersecurity
    Folino, Gianluigi
    Godano, Carla Otranto
    Pisani, Francesco Sergio
    [J]. JOURNAL OF SUPERCOMPUTING, 2023, 79 (11): : 11660 - 11683
  • [8] Some Poisson-Based Processes at Geometric Times
    Meoli, Alessandra
    [J]. JOURNAL OF STATISTICAL PHYSICS, 2023, 190 (06)
  • [9] Poisson-based detection limit and signal confidence intervals for few total counts
    Alvarez, Joseph L.
    [J]. HEALTH PHYSICS, 2007, 93 (02): : 120 - 126
  • [10] Poisson-Based Weight Reduction of Animated Meshes
    Landreneau, Eric
    Schaefer, Scott
    [J]. COMPUTER GRAPHICS FORUM, 2010, 29 (06) : 1945 - 1954