2019 IEEE 5th International Conference on Identity, Security, and Behavior Analysis (ISBA) 2019
DOI: 10.1109/isba.2019.8778466
|View full text |Cite
|
Sign up to set email alerts
|

User Behavior Profiling using Ensemble Approach for Insider Threat Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0
2

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(14 citation statements)
references
References 8 publications
0
11
0
2
Order By: Relevance
“…De-noising autoencoders has been used for encoding user log file in [24], while anomalous data has been identified using integrated methods like GMM, buck covariance, OCSVM, isolation forest and local outlier factor. In [29] Multi State Long Short Term Memory (MSLSTM) and CNN based hybrid ML approach has been introduced which works by using time series anomaly detection method for outlier detection in user behavioral patterns. Aspect based sentiment analysis and social network information of the user using hybrid DL techniques such as Gated Recurrent Unit (GRU) and skipgram are proposed in [30] to detect insider threat.…”
Section: User Behavior Based Insider Detection Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…De-noising autoencoders has been used for encoding user log file in [24], while anomalous data has been identified using integrated methods like GMM, buck covariance, OCSVM, isolation forest and local outlier factor. In [29] Multi State Long Short Term Memory (MSLSTM) and CNN based hybrid ML approach has been introduced which works by using time series anomaly detection method for outlier detection in user behavioral patterns. Aspect based sentiment analysis and social network information of the user using hybrid DL techniques such as Gated Recurrent Unit (GRU) and skipgram are proposed in [30] to detect insider threat.…”
Section: User Behavior Based Insider Detection Techniquesmentioning
confidence: 99%
“…It is also observed that most Role based or Behavior based techniques produce significant quantitative results as compared to graph based and other techniques. The most widely used technique is LSTM [5], [10], [14], [19], [29], [32]. Another widely used technique is Deep AutoEncoders [4], [24], it has the ability to be used on real valued datasets and are quick & concise.…”
Section: A Comparative Study Of Existing Techniquesmentioning
confidence: 99%
“…A abordagem proposta compreendeu a extração automatizada de recursos usando Word2vec e detecção de ameaças internas usando um codificador automático. E, finalmente, [Singh et al 2019] também abordaram a questão da ameaça interna, como propuseram [Liu et al 2019], entretanto estes autores ofereceram uma proposta que consiste em um LSTM modificado como LSTM de vários estados, sendo semelhante ao Processamento de Linguagem Natural (PLN) para aprender a linguagem de comportamento do usuário.…”
Section: Trabalhos Realizadosunclassified
“…Da análise dos trabalhos relacionados com o uso de ML em DLPS para detecção de exfiltração de dados, pode-se perceber que ainda não existem trabalhos que identifiquem o uso do HDFS em proveito de uma ação hacker, apesar da existência desta lacuna de estudo, conforme apresentada na subseção "Segurança em HDFS". Ainda assim, os trabalhos de [Liu et al 2019] e [Singh et al 2019] apresentaram abordagens relacionadas a ameças internas e em comparação com este framework, a diferença existe na origem do emissor, pois nesta pesquisa, aborda-se a ação de malware de exfiltração e não a ação de usuários mal intencionados. Entretanto, a pesquisa de [Singh et al 2019] apresenta o uso de dados em claro, sendo esta possibilidade descartada neste framework, pois o conteúdo internoé criptografado, restando apenas a possibilidade de análise de metadados.…”
Section: Framework Para Detecção De Exfiltração Em Hdfs Baseado Em Dlpsunclassified
“…GUI interactions, including keyboard activity and mouse movements were modeled via SVM in [85] and random forest applied to Microsoft Word interactions in [86]. Recurrent and convolutional neural networks were employed in [87] to model the temporal behavior of various user behaviors, like logon times, and types of applications and amounts of data accessed, to detect anomalies. These models perform comparably the collection of methods discussed in [88].…”
Section: Host-based Indicatorsmentioning
confidence: 99%