A Data-Driven Evaluation for Insider Threats

被引:8
|
作者
Sun, Yuqing [1 ]
Xu, Haoran [1 ]
Bertino, Elisa [2 ]
Sun, Chao [1 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Jinan, Peoples R China
[2] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
基金
中国国家自然科学基金;
关键词
Insider threat; Audit; Behavior analysis;
D O I
10.1007/s41019-016-0009-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Insiders are often legal users who are authorized to access system and data. If they misuse their privileges, it would bring great threat to system security. In practice, we could not have any knowledge about fraud pattern in advance, and most malicious behaviors are often in accordance with security rules; thus, it is difficult to predefine regulations for preventing all kinds of frauds. In this paper, we propose a data-driven evaluation model to detect malicious insiders, which audits user behaviors from both parallel and incremental aspects. Users are grouped together according to their positions and responsibilities, based on which the normal pattern is learned. For each user, a routine behavior pattern is also learned for historical assessment. Then, users are evaluated against both group patterns and routine patterns by probabilistic methods. The deviation degree is adopted as an evidence to justify an anomaly. We also recognize the abnormal activities that often make a user behavior much deviate, which can help an administrator revisit security policies or update activity weights in assessment. At last, experiments are performed on several real dataset.
引用
收藏
页码:73 / 85
页数:13
相关论文
共 50 条
  • [1] Phoneypot: Data-driven Understanding of Telephony Threats
    Gupta, Payas
    Srinivasan, Bharat
    Balasubramaniyan, Vijay
    Ahamad, Mustaque
    [J]. 22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
  • [2] Automated data-driven profiling: threats for group privacy
    Mavriki, Paola
    Karyda, Maria
    [J]. INFORMATION AND COMPUTER SECURITY, 2020, 28 (02) : 183 - 197
  • [3] A Framework for Data-Driven Physical Security and Insider Threat Detection
    Mavroeidis, Vasileios
    Vishi, Kamer
    Josang, Audun
    [J]. 2018 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM), 2018, : 1108 - 1115
  • [4] Towards a data-driven behavioral approach to prediction of insider-threat
    Basu, Subhasree
    Chua, Yi Han Victoria
    Lee, Mei Wah
    Lim, Wanyu Geraldine
    Maszczyk, Tomasz
    Guo, Zheng
    Dauwels, Justin
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2018, : 4994 - 5001
  • [5] The Intent and Extent of Collective Threats: A Data-Driven Conceptualization of Collective Threats and Their Relation to Political Preferences
    Kahn, Dennis T.
    Bjorklund, Fredrik
    Hirschberger, Gilad
    [J]. JOURNAL OF EXPERIMENTAL PSYCHOLOGY-GENERAL, 2022, 151 (05) : 1178 - 1198
  • [6] Redefining insider threats: a distinction between insider hazards and insider threats
    Mathias Reveraert
    Tom Sauer
    [J]. Security Journal, 2021, 34 : 755 - 775
  • [7] An Extension to the Data-driven Ontology Evaluation
    Hlomani, Hlomani
    Stacey, Deborah
    [J]. 2014 IEEE 15TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI), 2014, : 845 - 849
  • [8] A Data-Driven Conceptualization of Teacher Evaluation
    Namaghi, Seyyed Ali Ostovar
    [J]. QUALITATIVE REPORT, 2010, 15 (06) : 1504 - 1522
  • [9] Redefining insider threats: a distinction between insider hazards and insider threats
    Reveraert, Mathias
    Sauer, Tom
    [J]. SECURITY JOURNAL, 2021, 34 (04) : 755 - 775
  • [10] IoT Network Security: Threats, Risks, and a Data-Driven Defense Framework
    Wheelus, Charles
    Zhu, Xingquan
    [J]. IOT, 2020, 1 (02): : 259 - 285