LAC : LSTM AUTOENCODER with Community for Insider Threat Detection

08/13/2020
by   Sudipta Paul, et al.
0

The employees of any organization, institute, or industry, spend a significant amount of time on a computer network, where they develop their own routine of activities in the form of network transactions over a time period. Insider threat detection involves identifying deviations in the routines or anomalies which may cause harm to the organization in the form of data leaks and secrets sharing. If not automated, this process involves feature engineering for modeling human behavior which is a tedious and time-consuming task. Anomalies in human behavior are forwarded to a human analyst for final threat classification. We developed an unsupervised deep neural network model using LSTM AUTOENCODER which learns to mimic the behavior of individual employees from their day-wise time-stamped sequence of activities. It predicts the threat scenario via significant loss from anomalous routine. Employees in a community tend to align their routine with each other rather than the employees outside their communities, this motivates us to explore a variation of the AUTOENCODER, LSTM AUTOENCODER- trained on the interleaved sequences of activities in the Community (LAC). We evaluate the model on the CERT v6.2 dataset and perform analysis on the loss for normal and anomalous routine across 4000 employees. The aim of our paper is to detect the anomalous employees as well as to explore how the surrounding employees are affecting that employees' routine over time.

READ FULL TEXT
research
10/02/2017

Deep Learning for Unsupervised Insider Threat Detection in Structured Cybersecurity Data Streams

Analysis of an organization's computer network activity is a key compone...
research
02/25/2023

RipViz: Finding Rip Currents by Learning Pathline Behavior

We present a hybrid machine learning and flow analysis feature detection...
research
08/24/2021

Image-based Insider Threat Detection via Geometric Transformation

Insider threat detection has been a challenging task over decades, exist...
research
10/11/2019

Anticipating Illegal Maritime Activities from Anomalous Multiscale Fleet Behaviors

Illegal fishing is prevalent throughout the world and heavily impacts th...
research
02/15/2018

Detecting Anomalous Faces with 'No Peeking' Autoencoders

Detecting anomalous faces has important applications. For example, a sys...
research
06/27/2022

Auditing Visualizations: Transparency Methods Struggle to Detect Anomalous Behavior

Transparency methods such as model visualizations provide information th...
research
11/13/2019

Image-Based Feature Representation for Insider Threat Classification

Insiders are the trusted entities in the organization, but poses threat ...

Please sign up or login with your details

Forgot password? Click here to reset