A Bayesian approach to insider threat detection

Insider attacks are an ever-increasing threat for organizations, with dire consequences. Rogue employees who possess legitimate access to systems, and knowledge of security policies and monitoring practices of organizations, can evade detection. Organizations remain ill-equipped in detecting, deterr...

Full description

Bibliographic Details
Main Authors: Wall, A, Agrafiotis, I
Format: Journal article
Language:English
Published: Innovative Information Science & Technology Research Group 2021
_version_ 1797090734840479744
author Wall, A
Agrafiotis, I
author_facet Wall, A
Agrafiotis, I
author_sort Wall, A
collection OXFORD
description Insider attacks are an ever-increasing threat for organizations, with dire consequences. Rogue employees who possess legitimate access to systems, and knowledge of security policies and monitoring practices of organizations, can evade detection. Organizations remain ill-equipped in detecting, deterring and mitigating sophisticated insider attacks, as traditional security controls and detection systems are tailored to external threats. Literature on insider threat detection provides the theoretical foundation to understand the motives, behavior and patterns of insider attacks. The majority of proposed models for insider threat anomaly detection, mainly focus on processing network data. In this paper, we propose and evaluate a Bayesian Network architecture that can consider behavioral aspects in tandem with network data. Our system utilizes machine learning to understand the structure of the data, inputs specially crafted features based on theoretical foundations of insider threat and enables analysts to consider behavioral features, if such data is available. We applied our system on CMU’s synthetic dataset and our results provide justified and informed decisions on selecting parameters for Bayesian Networks and suggest that such an approach is highly effective. All attacks in the dataset were identified, with a very low number of false positives.
first_indexed 2024-03-07T03:22:57Z
format Journal article
id oxford-uuid:b80bf744-65a4-4b48-bf0e-1b159e029df8
institution University of Oxford
language English
last_indexed 2024-03-07T03:22:57Z
publishDate 2021
publisher Innovative Information Science & Technology Research Group
record_format dspace
spelling oxford-uuid:b80bf744-65a4-4b48-bf0e-1b159e029df82022-03-27T04:53:12ZA Bayesian approach to insider threat detectionJournal articlehttp://purl.org/coar/resource_type/c_dcae04bcuuid:b80bf744-65a4-4b48-bf0e-1b159e029df8EnglishSymplectic ElementsInnovative Information Science & Technology Research Group2021Wall, AAgrafiotis, IInsider attacks are an ever-increasing threat for organizations, with dire consequences. Rogue employees who possess legitimate access to systems, and knowledge of security policies and monitoring practices of organizations, can evade detection. Organizations remain ill-equipped in detecting, deterring and mitigating sophisticated insider attacks, as traditional security controls and detection systems are tailored to external threats. Literature on insider threat detection provides the theoretical foundation to understand the motives, behavior and patterns of insider attacks. The majority of proposed models for insider threat anomaly detection, mainly focus on processing network data. In this paper, we propose and evaluate a Bayesian Network architecture that can consider behavioral aspects in tandem with network data. Our system utilizes machine learning to understand the structure of the data, inputs specially crafted features based on theoretical foundations of insider threat and enables analysts to consider behavioral features, if such data is available. We applied our system on CMU’s synthetic dataset and our results provide justified and informed decisions on selecting parameters for Bayesian Networks and suggest that such an approach is highly effective. All attacks in the dataset were identified, with a very low number of false positives.
spellingShingle Wall, A
Agrafiotis, I
A Bayesian approach to insider threat detection
title A Bayesian approach to insider threat detection
title_full A Bayesian approach to insider threat detection
title_fullStr A Bayesian approach to insider threat detection
title_full_unstemmed A Bayesian approach to insider threat detection
title_short A Bayesian approach to insider threat detection
title_sort bayesian approach to insider threat detection
work_keys_str_mv AT walla abayesianapproachtoinsiderthreatdetection
AT agrafiotisi abayesianapproachtoinsiderthreatdetection
AT walla bayesianapproachtoinsiderthreatdetection
AT agrafiotisi bayesianapproachtoinsiderthreatdetection