DocumentCode :
3035861
Title :
Insider Threat Detection Using Graph-Based Approaches
Author :
Eberle, William ; Holder, Lawrence
Author_Institution :
Tennessee Technol. Univ., TN
fYear :
2009
fDate :
3-4 March 2009
Firstpage :
237
Lastpage :
241
Abstract :
Protecting our nation´s cyber infrastructure and securing sensitive information are critical challenges for homeland security and require the research, development and deployment of new technologies that can be transitioned into the field for combating cyber security risks. Particular areas of concern are the deliberate and intended actions associated with malicious exploitation, theft or destruction of data, or the compromise of networks, communications or other IT resources, of which the most harmful and difficult to detect threats are those propagated by an insider. However, current efforts to identify unauthorized access to information, such as what is found in document control and management systems, are limited in scope and capabilities. In order to address this issue, this effort involves performing further research and development on the existing graph-based anomaly detection (GBAD) system. GBAD discovers anomalous instances of structural patterns in data that represent entities, relationships and actions. Input to GBAD is a labeled graph in which entities are represented by labeled vertices and relationships or actions are represented by labeled edges between entities. Using the minimum description length (MDL) principle to identify the normative pattern that minimizes the number of bits needed to describe the input graph after being compressed by the pattern, GBAD implements algorithms for identifying the three possible changes to a graph: modifications, insertions and deletions. Each algorithm discovers those substructures that match the closest to the normative pattern without matching exactly.
Keywords :
graph theory; pattern matching; security of data; insider threat detection; labeled graph-based anomaly detection system; labeled vertex; minimum description length principle; normative pattern matching; unauthorized access identification; Communication system security; Computer security; Control systems; Data analysis; Data mining; Data security; Information security; Pattern matching; Personnel; Terrorism;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Conference For Homeland Security, 2009. CATCH '09. Cybersecurity Applications & Technology
Conference_Location :
Washington, DC
Print_ISBN :
978-0-7695-3568-5
Type :
conf
DOI :
10.1109/CATCH.2009.7
Filename :
4804450
Link To Document :
بازگشت