Doc2vec-based Insider Threat Detection through Behaviour Analysis of Multi-source Security Logs

被引:4
|
作者
Liu, Liu [1 ]
Chen, Chao [2 ]
Zhang, Jun [1 ]
De Vel, Olivier [3 ]
Xiang, Yang [1 ]
机构
[1] Swinburne Univ Technol, Sch Software & Elect Engn, Hawthorn, Vic, Australia
[2] James Cook Univ, Coll Sci & Engn, Townsville, Qld, Australia
[3] Dept Def, Def Sci & Technol Grp, Canberra, SA, Australia
关键词
insider threats; data analytics; word embedding; cyber security;
D O I
10.1109/TrustCom50675.2020.00050
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Since insider attacks have been recognised as one of the most critical cyber security threats to an organisation, detection of malicious insiders has received increasing attention in recent years. Previously, we proposed an approach that performs the detection by analysing various security logs with Word2vec, which not only removes the reliance on prior knowledge but also greatly simplifies the process of decision making and improves the interpretability of the alerts. In this paper, following the similar idea, a new Doc2vec based approach is proposed to overcome the previous approach's limitations: (1) the behaviour metrics can be acquired straightforwardly due to the Doc2vec's capability in inferring unseen texts of any length; (2) other than the temporal metrics, some spatial metrics can also be realised, providing a more comprehensive insight into the unusual behaviours; and (3) a range of corpora are produced by adopting different keywords to aggregate, each of which may be suited to a specific type of behaviour metrics. A large number of numerical experiments are conducted using the same benchmark insider threat database, for the purpose of testing how the corpora, metrics and training parameters impact on the performance and be related to each other. The experiments demonstrate that the proposed approach can achieve a similar performance with greater simplicity and flexibility.
引用
收藏
页码:301 / 309
页数:9
相关论文
共 21 条
  • [1] Insider Threat Identification Using the Simultaneous Neural Learning of Multi-Source Logs
    Liu, Liu
    Chen, Chao
    Zhang, Jun
    De Vel, Olivier
    Xiang, Yang
    [J]. IEEE ACCESS, 2019, 7 : 183162 - 183176
  • [2] Insider Threat Detection Based on Deep Clustering of Multi-Source Behavioral Events
    Wang, Jiarong
    Sun, Qianran
    Zhou, Caiqiu
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (24):
  • [3] A Doc2Vec-Based Assessment of Comments and Its Application to Change-Prone Method Analysis
    Aman, Hirohisa
    Amasaki, Sousuke
    Yokogawa, Tomoyuki
    Kawahara, Minoru
    [J]. 2018 25TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2018), 2018, : 643 - 647
  • [4] Cyber intrusion detection through association rule mining on multi-source logs
    Ping Lou
    Guantong Lu
    Xuemei Jiang
    Zheng Xiao
    Jiwei Hu
    Junwei Yan
    [J]. Applied Intelligence, 2021, 51 : 4043 - 4057
  • [5] Cyber intrusion detection through association rule mining on multi-source logs
    Lou, Ping
    Lu, Guantong
    Jiang, Xuemei
    Xiao, Zheng
    Hu, Jiwei
    Yan, Junwei
    [J]. APPLIED INTELLIGENCE, 2021, 51 (06) : 4043 - 4057
  • [6] Network threat detection based on correlation analysis of multi-platform multi-source alert data
    Xindai Lu
    Jiajia Han
    Qianbo Ren
    Hua Dai
    Jiyuan Li
    Jing Ou
    [J]. Multimedia Tools and Applications, 2020, 79 : 33349 - 33363
  • [7] Network threat detection based on correlation analysis of multi-platform multi-source alert data
    Lu, Xindai
    Han, Jiajia
    Ren, Qianbo
    Dai, Hua
    Li, Jiyuan
    Ou, Jing
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (45-46) : 33349 - 33363
  • [8] Big-Data Analysis of Multi-Source Logs for Anomaly Detection on Network-based System
    Jia Zhanpei
    Shen Chao
    Yi Xiao
    Chen Yufei
    Yu Tianwen
    Guan Xiaohong
    [J]. 2017 13TH IEEE CONFERENCE ON AUTOMATION SCIENCE AND ENGINEERING (CASE), 2017, : 1136 - 1141
  • [9] Intelligent Log Analysis System for Massive and Multi-Source Security Logs: MMSLAS Design and Implementation Plan
    Sun, Yizhen
    Guo, Shaoming
    Chen, Zhongwei
    [J]. 2019 15TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS (MSN 2019), 2019, : 416 - 421
  • [10] Multi-source fusion-based security detection method for heterogeneous networks
    Wu, Hao
    Wang, Zhonghua
    [J]. COMPUTERS & SECURITY, 2018, 74 : 55 - 70