首页> 外文OA文献 >Automated Insider Threat Detection System Using User and Role-Based Profile Assessment
【2h】

Automated Insider Threat Detection System Using User and Role-Based Profile Assessment

机译:自动内幕威胁检测系统使用用户和基于角色的配置文件评估

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Organisations are experiencing an ever-growing concern of how to identify and defend against insider threats. Those who have authorised access to sensitive organisational data are placed in a position of power that could well be abused and could cause significant damage to an organisation. This could range from financial theft and intellectual property theft, through to the destruction of property and business reputation. Traditional intrusion detection systems are not designed, nor are capable, of identifying those who act maliciously within an organisation. In this paper, we describe an automated system that is capable of detecting insider threats within an organisation. We define a tree-structure profiling approach that incorporates the details of activities conducted by each user and each job role, and then use this to obtain a consistent representation of features that provide a rich description of the user's behaviour. Deviation can be assessed based on the amount of variance that each user exhibits across multiple attributes, compared against their peers. We have performed experimentation using 10 synthetic data-driven scenarios and found that the system can identify anomalous behaviour that may be indicative of a potential threat. We also show how our detection system can be combined with visual analytics tools to support further investigation by an analyst.
机译:组织对于如何识别和防御内部威胁的关注与日俱增。那些有权访问敏感组织数据的人被置于可能会被滥用并可能对组织造成重大损害的权力位置。从金融盗窃和知识产权盗窃到财产和商业声誉的破坏,范围可能很大。传统的入侵检测系统既没有设计也没有能力识别组织内恶意行为的人。在本文中,我们描述了一种能够检测组织内部人员威胁的自动化系统。我们定义了一种树状结构分析方法,该方法结合了每个用户和每个职位角色所进行活动的详细信息,然后使用它来获得功能的一致表示,这些功能可以提供对用户行为的丰富描述。可以根据每个用户在多个属性上与同伴相比所表现出的差异量来评估差异。我们使用10个合成数据驱动的方案进行了实验,发现该系统可以识别出可能表明潜在威胁的异常行为。我们还将展示如何将我们的检测系统与视觉分析工具结合起来,以支持分析师的进一步调查。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号