Applying One-Class Algorithms for Data Stream-Based Insider Threat Detection

An insider threat is anyone who has legitimate access to a particular organization’s network and uses that access to harm that organization. Insider threats may act with or without intent, but when they have an intention, they usually also have some specific motivation. This motivation ca...

Full description

Bibliographic Details
Main Authors: Rafael Bruno Peccatiello, Joao Jose Costa Gondim, Luis Paulo Faina Garcia
Format: Article
Language:English
Published: IEEE 2023-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10177772/
_version_ 1797772609748729856
author Rafael Bruno Peccatiello
Joao Jose Costa Gondim
Luis Paulo Faina Garcia
author_facet Rafael Bruno Peccatiello
Joao Jose Costa Gondim
Luis Paulo Faina Garcia
author_sort Rafael Bruno Peccatiello
collection DOAJ
description An insider threat is anyone who has legitimate access to a particular organization’s network and uses that access to harm that organization. Insider threats may act with or without intent, but when they have an intention, they usually also have some specific motivation. This motivation can vary, including but not limited to personal discontent, financial issues, and coercion. It is hard to face insider threats with traditional security solutions because those solutions are limited to the signature detection paradigm. To overcome this restriction, researchers have proposed using Machine Learning which can address Insider Threat issues more comprehensively. Some of them have used batch learning, and others have used stream learning. Batch approaches are simpler to implement, but the problem is how to apply them in the real world. That is because real insider threat scenarios have complex characteristics to address by batch learning. Although more complex, stream approaches are more comprehensive and feasible to implement. Some studies have also used unsupervised and supervised Machine Learning techniques, but obtaining labeled samples makes it hard to implement fully supervised solutions. This study proposes a framework that combines different data science techniques to address insider threat detection. Among them are using semi-supervised and supervised machine learning, data stream analysis, and periodic retraining procedures. The algorithms used in the implementation were Isolation Forest, Elliptic Envelop, and Local Outlier Factor. This study evaluated the results according to the values obtained by the precision, recall, and F1-Score metrics. The best results were obtained by the ISOF algorithm, with 0.78 for the positive class (malign) recall and 0.80 for the negative class (benign) recall.
first_indexed 2024-03-12T21:54:24Z
format Article
id doaj.art-b25d52c12ddc4bcc8a92a44151d798e1
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-03-12T21:54:24Z
publishDate 2023-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-b25d52c12ddc4bcc8a92a44151d798e12023-07-25T23:00:21ZengIEEEIEEE Access2169-35362023-01-0111705607057310.1109/ACCESS.2023.329382510177772Applying One-Class Algorithms for Data Stream-Based Insider Threat DetectionRafael Bruno Peccatiello0https://orcid.org/0009-0001-9075-7028Joao Jose Costa Gondim1https://orcid.org/0000-0002-5873-7502Luis Paulo Faina Garcia2https://orcid.org/0000-0003-0679-9143Department of Computer Science, University of Brasília, Brasília, BrazilDepartment of Computer Science, University of Brasília, Brasília, BrazilDepartment of Computer Science, University of Brasília, Brasília, BrazilAn insider threat is anyone who has legitimate access to a particular organization’s network and uses that access to harm that organization. Insider threats may act with or without intent, but when they have an intention, they usually also have some specific motivation. This motivation can vary, including but not limited to personal discontent, financial issues, and coercion. It is hard to face insider threats with traditional security solutions because those solutions are limited to the signature detection paradigm. To overcome this restriction, researchers have proposed using Machine Learning which can address Insider Threat issues more comprehensively. Some of them have used batch learning, and others have used stream learning. Batch approaches are simpler to implement, but the problem is how to apply them in the real world. That is because real insider threat scenarios have complex characteristics to address by batch learning. Although more complex, stream approaches are more comprehensive and feasible to implement. Some studies have also used unsupervised and supervised Machine Learning techniques, but obtaining labeled samples makes it hard to implement fully supervised solutions. This study proposes a framework that combines different data science techniques to address insider threat detection. Among them are using semi-supervised and supervised machine learning, data stream analysis, and periodic retraining procedures. The algorithms used in the implementation were Isolation Forest, Elliptic Envelop, and Local Outlier Factor. This study evaluated the results according to the values obtained by the precision, recall, and F1-Score metrics. The best results were obtained by the ISOF algorithm, with 0.78 for the positive class (malign) recall and 0.80 for the negative class (benign) recall.https://ieeexplore.ieee.org/document/10177772/Insider threat detectiondata streammachine learningone-class classification
spellingShingle Rafael Bruno Peccatiello
Joao Jose Costa Gondim
Luis Paulo Faina Garcia
Applying One-Class Algorithms for Data Stream-Based Insider Threat Detection
IEEE Access
Insider threat detection
data stream
machine learning
one-class classification
title Applying One-Class Algorithms for Data Stream-Based Insider Threat Detection
title_full Applying One-Class Algorithms for Data Stream-Based Insider Threat Detection
title_fullStr Applying One-Class Algorithms for Data Stream-Based Insider Threat Detection
title_full_unstemmed Applying One-Class Algorithms for Data Stream-Based Insider Threat Detection
title_short Applying One-Class Algorithms for Data Stream-Based Insider Threat Detection
title_sort applying one class algorithms for data stream based insider threat detection
topic Insider threat detection
data stream
machine learning
one-class classification
url https://ieeexplore.ieee.org/document/10177772/
work_keys_str_mv AT rafaelbrunopeccatiello applyingoneclassalgorithmsfordatastreambasedinsiderthreatdetection
AT joaojosecostagondim applyingoneclassalgorithmsfordatastreambasedinsiderthreatdetection
AT luispaulofainagarcia applyingoneclassalgorithmsfordatastreambasedinsiderthreatdetection