A Bayesian approach to insider threat detection
Insider attacks are an ever-increasing threat for organizations, with dire consequences. Rogue employees who possess legitimate access to systems, and knowledge of security policies and monitoring practices of organizations, can evade detection. Organizations remain ill-equipped in detecting, deterr...
Main Authors: | , |
---|---|
Format: | Journal article |
Language: | English |
Published: |
Innovative Information Science & Technology Research Group
2021
|
_version_ | 1797090734840479744 |
---|---|
author | Wall, A Agrafiotis, I |
author_facet | Wall, A Agrafiotis, I |
author_sort | Wall, A |
collection | OXFORD |
description | Insider attacks are an ever-increasing threat for organizations, with dire consequences. Rogue employees who possess legitimate access to systems, and knowledge of security policies and monitoring practices of organizations, can evade detection. Organizations remain ill-equipped in detecting, deterring and mitigating sophisticated insider attacks, as traditional security controls and detection systems are tailored to external threats. Literature on insider threat detection provides the theoretical foundation to understand the motives, behavior and patterns of insider attacks. The majority of proposed models for insider threat anomaly detection, mainly focus on processing network data. In this paper, we propose and evaluate a Bayesian Network architecture that can consider behavioral aspects in tandem with network data. Our system utilizes machine learning to understand the structure of the data, inputs specially crafted features based on theoretical foundations of insider threat and enables analysts to consider behavioral features, if such data is available. We applied our system on CMU’s synthetic dataset and our results provide justified and informed decisions on selecting parameters for Bayesian Networks and suggest that such an approach is highly effective. All attacks in the dataset were identified, with a very low number of false positives. |
first_indexed | 2024-03-07T03:22:57Z |
format | Journal article |
id | oxford-uuid:b80bf744-65a4-4b48-bf0e-1b159e029df8 |
institution | University of Oxford |
language | English |
last_indexed | 2024-03-07T03:22:57Z |
publishDate | 2021 |
publisher | Innovative Information Science & Technology Research Group |
record_format | dspace |
spelling | oxford-uuid:b80bf744-65a4-4b48-bf0e-1b159e029df82022-03-27T04:53:12ZA Bayesian approach to insider threat detectionJournal articlehttp://purl.org/coar/resource_type/c_dcae04bcuuid:b80bf744-65a4-4b48-bf0e-1b159e029df8EnglishSymplectic ElementsInnovative Information Science & Technology Research Group2021Wall, AAgrafiotis, IInsider attacks are an ever-increasing threat for organizations, with dire consequences. Rogue employees who possess legitimate access to systems, and knowledge of security policies and monitoring practices of organizations, can evade detection. Organizations remain ill-equipped in detecting, deterring and mitigating sophisticated insider attacks, as traditional security controls and detection systems are tailored to external threats. Literature on insider threat detection provides the theoretical foundation to understand the motives, behavior and patterns of insider attacks. The majority of proposed models for insider threat anomaly detection, mainly focus on processing network data. In this paper, we propose and evaluate a Bayesian Network architecture that can consider behavioral aspects in tandem with network data. Our system utilizes machine learning to understand the structure of the data, inputs specially crafted features based on theoretical foundations of insider threat and enables analysts to consider behavioral features, if such data is available. We applied our system on CMU’s synthetic dataset and our results provide justified and informed decisions on selecting parameters for Bayesian Networks and suggest that such an approach is highly effective. All attacks in the dataset were identified, with a very low number of false positives. |
spellingShingle | Wall, A Agrafiotis, I A Bayesian approach to insider threat detection |
title | A Bayesian approach to insider threat detection |
title_full | A Bayesian approach to insider threat detection |
title_fullStr | A Bayesian approach to insider threat detection |
title_full_unstemmed | A Bayesian approach to insider threat detection |
title_short | A Bayesian approach to insider threat detection |
title_sort | bayesian approach to insider threat detection |
work_keys_str_mv | AT walla abayesianapproachtoinsiderthreatdetection AT agrafiotisi abayesianapproachtoinsiderthreatdetection AT walla bayesianapproachtoinsiderthreatdetection AT agrafiotisi bayesianapproachtoinsiderthreatdetection |