Scalable Unsupervised Ensemble Algorithm For Effective Insider Threat Detection

作者: Otusile Oluwabukola , Ogbonna A.C , Ajayi Adebowale , Idowu Sunday , Ajayi Olutayo

DOI:

关键词:

摘要: Insider threats remain one of the oldest and notorious to information security. Early detection remains key preventing insider attacks on an system. The vast amount enterprise data little points pertaining calls for techniques handle rare class problem. This study conceptualised threat as a streaming problem.  Scalability systems represents gap in knowledge this disposition. Building existing unsupervised ensemble stream mining techniques, proposed algorithm evaluated it using Centre Analysis Internet Data (CAIDA) Anonymized trace dataset 2015. CAIDA datasets was used ascertain scalability quantised dictionary construction by applying distributive approach graph based anomaly (GBAD). Pattern learning system processes GBAD approach. Dictionary done Apache Spark top Hadoop stack. PLADS enhanced successfully discovered same anomalous substructure within fraction time (642 seconds) took process entire (59,743 when applied Anonymised 2015 dataset. Application distributed computing framework dictionaries user command depicted reduction processing under varying input sizes number reducers In conclusion, Threat Detection is essential complexity analysis algorithms showed scales increased users implemented prototype scaled increasing workloads showing its usefulness early threats. recommends use ensembles frameworks effective

参考文章(15)
Lawrence B. Holder, William Eberle, Mining for Structural Anomalies in Graph-based Data. DMIN. pp. 376- 389 ,(2007)
Yihua Liao, V. Rao Vemuri, Using Text Categorization Techniques for Intrusion Detection usenix security symposium. pp. 51- 59 ,(2002)
Eleazar Eskin, Salvatore Stolfo, Zhi-Da Zhong, Matthew Miller, Wei-Ang Lee, George Yi, Adaptive Model Generation for Intrusion Detection Systems ,(2000) , 10.7916/D8GX4J9V
E Eskin, Andrew Arnold, Michael Prerau, Leonid Portnoy, Sal Stolfo, A GEOMETRIC FRAMEWORK FOR UNSUPERVISED ANOMALY DETECTION: DETECTING INTRUSIONS IN UNLABELED DATA APPLICATIONS OF DATA MINING IN COMPUTER SECURITY. pp. 0- 0 ,(2002) , 10.7916/D8D50TQT
Debin Gao, Dawn Song, Michael K. Reiter, On gray-box program tracking for anomaly detection usenix security symposium. pp. 8- 8 ,(2004)
Steven A. Hofmeyr, Stephanie Forrest, Anil Somayaji, Intrusion detection using sequences of system calls Journal of Computer Security. ,vol. 6, pp. 151- 180 ,(1998) , 10.3233/JCS-980109
Yehuda Vardi, Martin Theusan, Alan F. Karr, Wen-Hua Ju, William DuMouchel, Matthias Schonlau, Computer Intrusion: Detecting Masquerades Statistical Science. ,vol. 16, pp. 58- 74 ,(2001) , 10.1214/SS/998929476
Nikhil S. Ketkar, Lawrence B. Holder, Diane J. Cook, Subdue Proceedings of the 1st international workshop on open source data mining frequent pattern mining implementations - OSDM '05. pp. 71- 76 ,(2005) , 10.1145/1133905.1133915
Mohammad M Masud, Tahseen M Al-Khateeb, Latifur Khan, Charu Aggarwal, Jing Gao, Jiawei Han, Bhavani Thuraisingham, None, Detecting Recurring and Novel Classes in Concept-Drifting Data Streams international conference on data mining. pp. 1176- 1181 ,(2011) , 10.1109/ICDM.2011.49
Pallabi Parveen, Zackary R. Weger, Bhavani Thuraisingham, Kevin Hamlen, Latifur Khan, Supervised Learning for Insider Threat Detection Using Stream Mining international conference on tools with artificial intelligence. pp. 1032- 1039 ,(2011) , 10.1109/ICTAI.2011.176