Use of Domain Knowledge to Detect Insider Threats in Computer Activities

IEEE Symposium on Security and Privacy Workshops(2013)

引用 59|浏览132
暂无评分
摘要
This paper reports the first set of results from a comprehensive set of experiments to detect realistic insider threat instances in a real corporate database of computer usage activity. It focuses on the application of domain knowledge to provide starting points for further analysis. Domain knowledge is applied (1) to select appropriate features for use by structural anomaly detection algorithms, (2) to identify features indicative of activity known to be associated with insider threat, and (3) to model known or suspected instances of insider threat scenarios. We also introduce a visual language for specifying anomalies across different types of data, entities, baseline populations, and temporal ranges. Preliminary results of our experiments on two months of live data suggest that these methods are promising, with several experiments providing area under the curve scores close to 1.0 and lifts ranging from x20 to x30 over random.
更多
查看译文
关键词
insider threat scenario,comprehensive set,domain knowledge,realistic insider threat instance,detect insider threats,computer activities,insider threat,live data,baseline population,curve score,computer usage activity,appropriate feature,feature extraction,database management systems,statistics,detectors,sociology,anomaly detection
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要