Image-Based Feature Representation for Insider Threat Classification

11/13/2019
by   Gayathri R G, et al.
0

Insiders are the trusted entities in the organization, but poses threat to the with access to sensitive information network and resources. The insider threat detection is a well studied problem in security analytics. Identifying the features from data sources and using them with the right data analytics algorithms makes various kinds of threat analysis possible. The insider threat analysis is mainly done using the frequency based attributes extracted from the raw data available from data sources. In this paper, we propose an image-based feature representation of the daily resource usage pattern of users in the organization. The features extracted from the audit files of the organization are represented as gray scale images. Hence, these images are used to represent the resource access patterns and thereby the behavior of users. Classification models are applied to the representative images to detect anomalous behavior of insiders. The images are classified to malicious and non-malicious. The effectiveness of the proposed representation is evaluated using the CMU CERT data V4.2, and state-of-art image classification models like Mobilenet, VGG and ResNet. The experimental results showed improved accuracy. The comparison with existing works show a performance improvement in terms of high recall and precision values.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/24/2021

Image-based Insider Threat Detection via Geometric Transformation

Insider threat detection has been a challenging task over decades, exist...
research
02/10/2021

DANTE: Predicting Insider Threat using LSTM on system logs

Insider threat is one of the most pernicious threat vectors to informati...
research
10/18/2022

A Novel Feature Representation for Malware Classification

In this study we have presented a novel feature representation for malic...
research
12/09/2022

CopAS: A Big Data Forensic Analytics System

With the advancing digitization of our society, network security has bec...
research
06/02/2010

Métodos para la Selección y el Ajuste de Características en el Problema de la Detección de Spam

The email is used daily by millions of people to communicate around the ...
research
08/13/2020

LAC : LSTM AUTOENCODER with Community for Insider Threat Detection

The employees of any organization, institute, or industry, spend a signi...
research
04/04/2020

Knife and Threat Detectors

Despite rapid advances in image-based machine learning, the threat ident...

Please sign up or login with your details

Forgot password? Click here to reset