DANTE: Predicting Insider Threat using LSTM on system logs

02/10/2021
by   Nidhi Rastogi, et al.
0

Insider threat is one of the most pernicious threat vectors to information and communication technologies (ICT)across the world due to the elevated level of trust and access that an insider is afforded. This type of threat can stem from both malicious users with a motive as well as negligent users who inadvertently reveal details about trade secrets, company information, or even access information to malignant players. In this paper, we propose a novel approach that uses system logs to detect insider behavior using a special recurrent neural network (RNN) model. Ground truth is established using DANTE and used as the baseline for identifying anomalous behavior. For this, system logs are modeled as a natural language sequence and patterns are extracted from these sequences. We create workflows of sequences of actions that follow a natural language logic and control flow. These flows are assigned various categories of behaviors - malignant or benign. Any deviation from these sequences indicates the presence of a threat. We further classify threats into one of the five categories provided in the CERT insider threat dataset. Through experimental evaluation, we show that the proposed model can achieve 99 prediction accuracy.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/13/2019

Image-Based Feature Representation for Insider Threat Classification

Insiders are the trusted entities in the organization, but poses threat ...
research
11/11/2021

Catching Unusual Traffic Behavior using TF-IDF-based Port Access Statistics Analysis

Detecting the anomalous behavior of traffic is one of the important acti...
research
10/02/2017

Deep Learning for Unsupervised Insider Threat Detection in Structured Cybersecurity Data Streams

Analysis of an organization's computer network activity is a key compone...
research
07/14/2020

ADSAGE: Anomaly Detection in Sequences of Attributed Graph Edges applied to insider threat detection at fine-grained level

Previous works on the CERT insider threat detection case have neglected ...
research
05/15/2018

Neural Classification of Malicious Scripts: A study with JavaScript and VBScript

Malicious scripts are an important computer infection threat vector. Our...
research
10/25/2022

Clustering of Threat Information to Mitigate Information Overload for Computer Emergency Response Teams

The constantly increasing number of threats and the existing diversity o...
research
12/01/2018

AnyThreat: An Opportunistic Knowledge Discovery Approach to Insider Threat Detection

Insider threat detection is getting an increased concern from academia, ...

Please sign up or login with your details

Forgot password? Click here to reset