A Data-Driven Evaluation for Insider Threats

被引:8
|
作者
Sun, Yuqing [1 ]
Xu, Haoran [1 ]
Bertino, Elisa [2 ]
Sun, Chao [1 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Jinan, Peoples R China
[2] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
基金
中国国家自然科学基金;
关键词
Insider threat; Audit; Behavior analysis;
D O I
10.1007/s41019-016-0009-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Insiders are often legal users who are authorized to access system and data. If they misuse their privileges, it would bring great threat to system security. In practice, we could not have any knowledge about fraud pattern in advance, and most malicious behaviors are often in accordance with security rules; thus, it is difficult to predefine regulations for preventing all kinds of frauds. In this paper, we propose a data-driven evaluation model to detect malicious insiders, which audits user behaviors from both parallel and incremental aspects. Users are grouped together according to their positions and responsibilities, based on which the normal pattern is learned. For each user, a routine behavior pattern is also learned for historical assessment. Then, users are evaluated against both group patterns and routine patterns by probabilistic methods. The deviation degree is adopted as an evidence to justify an anomaly. We also recognize the abnormal activities that often make a user behavior much deviate, which can help an administrator revisit security policies or update activity weights in assessment. At last, experiments are performed on several real dataset.
引用
收藏
页码:73 / 85
页数:13
相关论文
共 50 条
  • [21] COMPASS: A Data-Driven Blockchain Evaluation Framework
    Tsai, Wei-Tek
    Wang, Rong
    Liu, Shuai
    Deng, Enyan
    Yang, Dong
    [J]. 2020 14TH IEEE INTERNATIONAL CONFERENCE ON SERVICE-ORIENTED SYSTEM ENGINEERING (SOSE 2020), 2020, : 17 - 30
  • [22] PERFORMANCE OF THE EFFICIENT DATA-DRIVEN EVALUATION SCHEME
    JOHNSON, D
    BERMAN, F
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 1993, 18 (03) : 340 - 346
  • [23] Multiple Dimensions to Data-Driven Ontology Evaluation
    Hloman, Hlomani
    Stacey, Deborah A.
    [J]. KNOWLEDGE DISCOVERY, KNOWLEDGE ENGINEERING AND KNOWLEDGE MANAGEMENT, IC3K 2014, 2015, 553 : 329 - 346
  • [24] Data-Driven Evaluation of Project Risk Registers
    Erfani, Abdolmajid
    Ma, Zihui
    Cui, Qingbin
    Baecher, Gregory B.
    [J]. GEO-RISK 2023: INNOVATION IN DATA AND ANALYSIS METHODS, 2023, 345 : 152 - 160
  • [25] Data-Driven Development and Evaluation of Enskill English
    W. Lewis Johnson
    [J]. International Journal of Artificial Intelligence in Education, 2019, 29 : 425 - 457
  • [26] Defending against insider threats and internal data leakage
    You, Ilsun
    Lenzini, Gabriele
    Ogiela, Marek R.
    Bertino, Elisa
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (08) : 831 - 833
  • [27] DATA-DRIVEN
    Lev-Ram, Michal
    [J]. FORTUNE, 2016, 174 (05) : 76 - 81
  • [28] Towards data-driven autonomous cyber defence for military unmanned vehicles - threats & attacks
    Kaasen, Andreas Dybvik
    Grov, Gudmund
    Mancini, Federico
    Baksaas, Magnus
    [J]. 2022 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2022,
  • [29] Data-driven model for process evaluation in wire EDM
    Kupper, Ugur
    Klink, Andreas
    Bergs, Thomas
    [J]. CIRP ANNALS-MANUFACTURING TECHNOLOGY, 2023, 72 (01) : 169 - 172
  • [30] An Evaluation of Data-Driven Programming Hints in a Classroom Setting
    Price, Thomas W.
    Marwan, Samiha
    Winters, Michael
    Williams, Joseph Jay
    [J]. ARTIFICIAL INTELLIGENCE IN EDUCATION (AIED 2020), PT II, 2020, 12164 : 246 - 251