首页> 外文会议>2018 1st International Conference on Data Intelligence and Security >Combating Insider Threats by User Profiling from Activity Logging Data
【24h】

Combating Insider Threats by User Profiling from Activity Logging Data

机译:通过用户从活动日志数据中进行概要分析来打击内部威胁

获取原文
获取原文并翻译 | 示例

摘要

In cybersecurity, malicious insider threats represent a huge issue for organizations and may pose the greatest threat category. Combating the insider risks need an understanding of the behavior of each insider. Markov chains (MC) are particularly well suited to model behaviors from network traffic, they were extensively used for modeling and clustering actions. In this article, we explore Markov process to model profiles for individual users rather than modeling actions. That is, for every set of actions, there is a Markov chain labeled by that action flow that specifies the state transition probabilities resulting from each unique user. This modeling is appropriate to add a temporal component to data stream clustering, and its static nature can be dynamically adapted to each user's profile. From the network traffic, we demonstrate that potential insider threats can be pointed by formulating the request associated to a given threat scenario in form of a sequence of actions and scoring it against each user's pre-established MC model.
机译:在网络安全中,恶意内部威胁对于组织而言是一个巨大的问题,并且可能构成最大的威胁类别。应对内部人风险需要了解每个内部人的行为。马尔可夫链(MC)特别适合根据网络流量对行为进行建模,它们已广泛用于建模和聚类动作。在本文中,我们探索了马尔可夫过程来为单个用户建模配置文件,而不是为操作建模。也就是说,对于每组动作,都有一个由该动作流标记的马尔可夫链,该马尔可夫链指定了每个唯一用户所导致的状态转换概率。此建模适合将临时组件添加到数据流聚类,并且其静态性质可以动态地适应每个用户的个人资料。从网络流量中,我们证明了可以通过以动作序列的形式制定与给定威胁场景相关的请求并将其针对每个用户的预先建立的MC模型评分来指出潜在的内部威胁。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号