Study on user behavior profiling in insider threat detection

Behavior profiling technic using no-labeled historical data to build normal behavior model is an effective way to detect insider attackers. The state-of-the-art labeled profile methods extract features artificially and process data by simple statistical methods, whose incomplete behavior model lacks...

Full description

Saved in:
Bibliographic Details
Main Authors: Yuanbo GUO, Chunhui LIU, Jing KONG, Yifeng WANG
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2018-12-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018282/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539405063389184
author Yuanbo GUO
Chunhui LIU
Jing KONG
Yifeng WANG
author_facet Yuanbo GUO
Chunhui LIU
Jing KONG
Yifeng WANG
author_sort Yuanbo GUO
collection DOAJ
description Behavior profiling technic using no-labeled historical data to build normal behavior model is an effective way to detect insider attackers. The state-of-the-art labeled profile methods extract features artificially and process data by simple statistical methods, whose incomplete behavior model lacks details. An automated feature extracting and full-detail behavior profiling method as well as a behavior sequence splitting and business state transition predicting way was proposed. Combining above two methods, an insider threats detection framework was established, which improved detection accuracy. Experimenting with CMU-CERT data set, AUC (area under curve) score was 0.88 and F1 score was 0.925. With the better performance, it can be used in detecting insider threats.
format Article
id doaj-art-123b8bf0a4e14e1e9e3fbb6a363fce48
institution Kabale University
issn 1000-436X
language zho
publishDate 2018-12-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-123b8bf0a4e14e1e9e3fbb6a363fce482025-01-14T07:16:00ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2018-12-013914115059722521Study on user behavior profiling in insider threat detectionYuanbo GUOChunhui LIUJing KONGYifeng WANGBehavior profiling technic using no-labeled historical data to build normal behavior model is an effective way to detect insider attackers. The state-of-the-art labeled profile methods extract features artificially and process data by simple statistical methods, whose incomplete behavior model lacks details. An automated feature extracting and full-detail behavior profiling method as well as a behavior sequence splitting and business state transition predicting way was proposed. Combining above two methods, an insider threats detection framework was established, which improved detection accuracy. Experimenting with CMU-CERT data set, AUC (area under curve) score was 0.88 and F1 score was 0.925. With the better performance, it can be used in detecting insider threats.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018282/behavior sequenceprofiling extractioninsider threathidden Markov model
spellingShingle Yuanbo GUO
Chunhui LIU
Jing KONG
Yifeng WANG
Study on user behavior profiling in insider threat detection
Tongxin xuebao
behavior sequence
profiling extraction
insider threat
hidden Markov model
title Study on user behavior profiling in insider threat detection
title_full Study on user behavior profiling in insider threat detection
title_fullStr Study on user behavior profiling in insider threat detection
title_full_unstemmed Study on user behavior profiling in insider threat detection
title_short Study on user behavior profiling in insider threat detection
title_sort study on user behavior profiling in insider threat detection
topic behavior sequence
profiling extraction
insider threat
hidden Markov model
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018282/
work_keys_str_mv AT yuanboguo studyonuserbehaviorprofilingininsiderthreatdetection
AT chunhuiliu studyonuserbehaviorprofilingininsiderthreatdetection
AT jingkong studyonuserbehaviorprofilingininsiderthreatdetection
AT yifengwang studyonuserbehaviorprofilingininsiderthreatdetection