Use of Machine Learning in Big Data Analytics for Insider Threat Detection

被引:0
|
作者
Mayhew, Michael [1 ]
Atighetchi, Michael [2 ]
Adler, Aaron [2 ]
Greenstadt, Rachel [3 ]
机构
[1] US Air Force, Res Lab, Rome, NY USA
[2] Raytheon BBN Technol, Cambridge, MA USA
[3] Drexel Univ, Philadelphia, PA 19104 USA
关键词
trust; machine learning; usage patterns; documents; email; chat; TCP; HTTP; support vector machine; insider threat; big data;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In current enterprise environments, information is becoming more readily accessible across a wide range of interconnected systems. However, trustworthiness of documents and actors is not explicitly measured, leaving actors unaware of how latest security events may have impacted the trustworthiness of the information being used and the actors involved. This leads to situations where information producers give documents to consumers they should not trust and consumers use information from non-reputable documents or producers. The concepts and technologies developed as part of the Behavior-Based Access Control (BBAC) effort strive to overcome these limitations by means of performing accurate calculations of trustworthiness of actors, e.g., behavior and usage patterns, as well as documents, e.g., provenance and workflow data dependencies. BBAC analyses a wide range of observables for mal-behavior, including network connections, HTTP requests, English text exchanges through emails or chat messages, and edit sequences to documents. The current prototype service strategically combines big data batch processing to train classifiers and real-time stream processing to classifier observed behaviors at multiple layers. To scale up to enterprise regimes, BBAC combines clustering analysis with statistical classification in a way that maintains an adjustable number of classifiers.
引用
收藏
页码:915 / 922
页数:8
相关论文
共 50 条
  • [1] Anomaly Detection Using Deep Learning and Big Data Analytics for the Insider Threat Platform
    Alam, Abu
    Barron, Harry
    [J]. INTELLIGENT COMPUTING, VOL 1, 2022, 506 : 512 - 531
  • [2] Machine Learning for Insider Threat Detection
    Naicker, Tristan Sashlen
    van Niekerk, Brett
    [J]. PROCEEDINGS OF THE 3RD EUROPEAN CONFERENCE ON THE IMPACT OF ARTIFICIAL INTELLIGENCE AND ROBOTICS (ECIAIR 2021), 2021, : 122 - 131
  • [3] Analytics for early detection of insider threat
    Fenstermacher, Laurie
    Larson, Kathleen
    Vitiello, Christine
    Shellman, Steve
    Levey, Brian
    [J]. SIGNAL PROCESSING, SENSOR/INFORMATION FUSION, AND TARGET RECOGNITION XXXI, 2022, 12122
  • [4] Machine learning for big data analytics
    [J]. Oja, E. (erkki.oja@aalto.fi), 1600, Springer Verlag (384):
  • [5] Analyzing Data Granularity Levels for Insider Threat Detection Using Machine Learning
    Le, Duc C.
    Zincir-Heywood, Nur
    Heywood, Malcolm I.
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (01): : 30 - 44
  • [6] Insider Threat Detection Using Machine Learning Approach
    Sarhan, Bushra Bin
    Altwaijry, Najwa
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (01):
  • [7] Machine learning based Insider Threat Modelling and Detection
    Le, Duc C.
    Zincir-Heywood, A. Nur
    [J]. 2019 IFIP/IEEE SYMPOSIUM ON INTEGRATED NETWORK AND SERVICE MANAGEMENT (IM), 2019,
  • [8] Machine learning for Big Data analytics in plants
    Ma, Chuang
    Zhang, Hao Helen
    Wang, Xiangfeng
    [J]. TRENDS IN PLANT SCIENCE, 2014, 19 (12) : 798 - 808
  • [9] Big Data, Predictive Analytics and Machine Learning
    Ongsulee, Pariwat
    Chotchaung, Veena
    Bamrungsi, Eak
    Rodcheewit, Thanaporn
    [J]. 2018 16TH INTERNATIONAL CONFERENCE ON ICT AND KNOWLEDGE ENGINEERING (ICT&KE), 2018, : 37 - 42
  • [10] Machine Learning Technologies for Big Data Analytics
    Gandomi, Amir H.
    Chen, Fang
    Abualigah, Laith
    [J]. ELECTRONICS, 2022, 11 (03)