Proceedings of the 50th Hawaii International Conference on System Sciences (2017) 2017
DOI: 10.24251/hicss.2017.320
|View full text |Cite
|
Sign up to set email alerts
|

Insider Threat Detection in PRODIGAL

Abstract: Abstract-This paper reports on insider threat detection research, during which a prototype system (PRODIGAL)1 was developed and operated as a testbed for exploring a range of detection and analysis methods. The data and test environment, system components, and the core method of unsupervised detection of insider threat leads are presented to document this work and benefit others working in the insider threat domain.We also discuss a core set of experiments evaluating the prototype's ability to detect both know… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(7 citation statements)
references
References 22 publications
(41 reference statements)
0
7
0
Order By: Relevance
“…Many insider threat detection systems 16–19 were stemmed from DARPA's project ADAMS, 20 which aims to identify patterns and anomalies in very large datasets to combat insider threats. In Goldberg et al 18 and Senator et al, 19 various anomaly detection algorithms, including hidden Markov model (HMM) and Gaussian mixture model, were employed on user activity log data for identifying indicators of insider threats. Eldardiry et al proposed approaches employing hybrid of anomaly detectors on combined information from multiple domains (user activities) to detect blend‐in anomalies and unusual change anomalies 16 .…”
Section: Related Workmentioning
confidence: 99%
“…Many insider threat detection systems 16–19 were stemmed from DARPA's project ADAMS, 20 which aims to identify patterns and anomalies in very large datasets to combat insider threats. In Goldberg et al 18 and Senator et al, 19 various anomaly detection algorithms, including hidden Markov model (HMM) and Gaussian mixture model, were employed on user activity log data for identifying indicators of insider threats. Eldardiry et al proposed approaches employing hybrid of anomaly detectors on combined information from multiple domains (user activities) to detect blend‐in anomalies and unusual change anomalies 16 .…”
Section: Related Workmentioning
confidence: 99%
“…The CMU-CERT data sets are synthetic insider threat data sets generated by the CERT Division at Carnegie Mellon University [8,15]. CMU-CERT data repository is the only one available for insider threat scenarios (5 scenarios) and has recently become the evaluation data repository for researchers addressing the insider threat problem [5,16,41].…”
Section: Description Of the Datasetmentioning
confidence: 99%
“…This sheds light on the importance of the FP measure to address the shortcoming of the high number of false alarms (FPs). Furthermore, some approaches were validated in terms of: TP measure [31]; F1 measure [4,33]; AUC measure [9,11,16]; precision and recall [24,29]; accuracy [24,35]; and others.…”
Section: Evaluation Measuresmentioning
confidence: 99%
“…A further recent unsupervised ensemble-based anomaly detection system named PRODIGAL was presented in [11]; a result of five years work on the insider threat detection problem [12], [13], [14]. iForest is configured as one of the user-day detectors in PRODIGAL to detect complex insider threat scenarios in real user activities.…”
Section: Related Workmentioning
confidence: 99%
“…In this work, we utilised two highly performing anomaly detection algorithms: ocsvm and iForest, as base algorithms in the proposed framework to detect malicious insider threats. We adopted ocsvm and iForest, because each method has been utilised for insider threat detection, either as a base algorithm for the proposed approaches [5], [9], [10], [11], or as a benchmark against which the performance of a deep learning approach was compared to its performance [16]. a) Clustering Component: Malicious insiders have authorised access to the network, system, and data, and are aware of the system management and security policies.…”
Section: B Anomaly Detection Frameworkmentioning
confidence: 99%