内部威胁
异常检测
计算机科学
隐马尔可夫模型
知情人
异常(物理)
序列(生物学)
数据挖掘
假阳性率
网络安全
计算机安全
人工智能
机器学习
遗传学
生物
物理
法学
凝聚态物理
政治学
作者
Miguel Villarreal-Vasquez,Gaspar Modelo-Howard,Simant Dube,Bharat Bhargava
标识
DOI:10.1109/tdsc.2021.3135639
摘要
Insider threats are one of the most difficult problems to solve, given the privileges and information available to insiders to launch different types of attacks. Current security systems can record and analyze sequences from a deluge of log data, potentially becoming a tool to detect insider threats. The issue is that insiders mix the sequence of attack steps with valid actions, reducing the capacity of security systems to programmatically detect the attacks. To address this shortcoming, we introduce LADOHD, an anomaly detection framework based on Long-Short Term Memory (LSTM) models, which learns the expected event patterns in a computer system to identify attack sequences even when attacks span for a long time. The applicability of the framework is demonstrated on a dataset of 38.9 million events collected from a commercial network of 30 computers over twenty days and where a 4-day long insider threat attack occurs. Results show that LADOHD outperforms the anomaly detection system used to protect the commercial network with a True Positive Rate of 97.29% and a False Positive Rate of 0.38%. Experiments also show that LSTMs have higher prediction precision in variable-length sequences than methods like Hidden Markov Models, a crucial requirement in sequence-analysis-based anomaly detection techniques.
科研通智能强力驱动
Strongly Powered by AbleSci AI