DocumentCode :
622754
Title :
Use of Domain Knowledge to Detect Insider Threats in Computer Activities
Author :
Young, William T. ; Goldberg, Henry G. ; Memory, Alex ; Sartain, James F. ; Senator, Ted E.
Author_Institution :
SAIC, Arlington, VA, USA
fYear :
2013
fDate :
23-24 May 2013
Firstpage :
60
Lastpage :
67
Abstract :
This paper reports the first set of results from a comprehensive set of experiments to detect realistic insider threat instances in a real corporate database of computer usage activity. It focuses on the application of domain knowledge to provide starting points for further analysis. Domain knowledge is applied (1) to select appropriate features for use by structural anomaly detection algorithms, (2) to identify features indicative of activity known to be associated with insider threat, and (3) to model known or suspected instances of insider threat scenarios. We also introduce a visual language for specifying anomalies across different types of data, entities, baseline populations, and temporal ranges. Preliminary results of our experiments on two months of live data suggest that these methods are promising, with several experiments providing area under the curve scores close to 1.0 and lifts ranging from ×20 to ×30 over random.
Keywords :
database management systems; security of data; visual languages; computer activities; computer usage activity; corporate database; domain knowledge; insider threats; structural anomaly detection; threat scenarios; visual language; Computers; Detection algorithms; Detectors; Electronic mail; Feature extraction; Sociology; Statistics; anomaly detection; insider threat; experimental case study;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security and Privacy Workshops (SPW), 2013 IEEE
Conference_Location :
San Francisco, CA
Print_ISBN :
978-1-4799-0458-7
Type :
conf
DOI :
10.1109/SPW.2013.32
Filename :
6565230
Link To Document :
بازگشت