AnyThreat: An Opportunistic Knowledge Discovery Approach to Insider Threat Detection

12/01/2018
by   Diana Haidar, et al.
0

Insider threat detection is getting an increased concern from academia, industry, and governments due to the growing number of malicious insider incidents. The existing approaches proposed for detecting insider threats still have a common shortcoming, which is the high number of false alarms (false positives). The challenge in these approaches is that it is essential to detect all anomalous behaviours which belong to a particular threat. To address this shortcoming, we propose an opportunistic knowledge discovery system, namely AnyThreat, with the aim to detect any anomalous behaviour in all malicious insider threats. We design the AnyThreat system with four components. (1) A feature engineering component, which constructs community data sets from the activity logs of a group of users having the same role. (2) An oversampling component, where we propose a novel oversampling technique named Artificial Minority Oversampling and Trapper REmoval (AMOTRE). AMOTRE first removes the minority (anomalous) instances that have a high resemblance with normal (majority) instances to reduce the number of false alarms, then it synthetically oversamples the minority class by shielding the border of the majority class. (3) A class decomposition component, which is introduced to cluster the instances of the majority class into subclasses to weaken the effect of the majority class without information loss. (4) A classification component, which applies a classification method on the subclasses to achieve a better separation between the majority class(es) and the minority class(es). AnyThreat is evaluated on synthetic data sets generated by Carnegie Mellon University. It detects approximately 87.5 achieves the minimum of false positives=3.36

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/18/2022

LogKernel A Threat Hunting Approach Based on Behaviour Provenance Graph and Graph Kernel Clustering

Cyber threat hunting is a proactive search process for hidden threats in...
research
04/07/2019

Reframing Threat Detection: Inside esINSIDER

We describe the motivation and design for esINSIDER, an automated tool t...
research
10/02/2017

Deep Learning for Unsupervised Insider Threat Detection in Structured Cybersecurity Data Streams

Analysis of an organization's computer network activity is a key compone...
research
08/31/2021

DeepTaskAPT: Insider APT detection using Task-tree based Deep Learning

APT, known as Advanced Persistent Threat, is a difficult challenge for c...
research
05/19/2021

Hunter in the Dark: Discover Anomalous Network Activity Using Deep Ensemble Network

Machine learning (ML)-based network intrusion detection system (NIDS) pl...
research
02/10/2021

DANTE: Predicting Insider Threat using LSTM on system logs

Insider threat is one of the most pernicious threat vectors to informati...
research
04/27/2023

Detecting inner-LAN anomalies using hierarchical forecasting

Increasing activity and the number of devices online are leading to incr...

Please sign up or login with your details

Forgot password? Click here to reset