Katalog Plus
Bibliothek der Frankfurt UAS
Bald neuer Katalog: sichern Sie sich schon vorab Ihre persönlichen Merklisten im Nutzerkonto: Anleitung.
Dieses Ergebnis aus BASE kann Gästen nicht angezeigt werden.  Login für vollen Zugriff.

Detecting Insider Threats in a Real corporate Database of Computer Usage Activity

Title: Detecting Insider Threats in a Real corporate Database of Computer Usage Activity
Authors: Senator, Ted E.; Goldberg, Henry G.; Memory, Alex; Young, William T.; Rees, Brad; Pierce, Robert; Huang, Daniel; Reardon, Matthew; Bader, David A.; Chow, Edmond; Essa, Irfan; Jones, Joshua; Bettadapura, Vinay; Chau, Duen Horng; Green, Oded; Kaya, Oguz; Zakrzewska, Anita; Briscoe, Erica; Mappus, Rudolph L.; McColl, Robert; Weiss, Lora; Dietterich, Thomas G.; Fern, Alan; Wong, Weng-Keen; Das, Shubhomoy; Emmott, Andrew; Irvine, Jed; Lee, Jay-Yoon; Koutra, Danai; Faloutsos, Christos; Corkill, Daniel; Friedland, Lisa; Gentzel, Amanda; Jensen, David
Contributors: Lee, Jay-Yoon
Publisher Information: ASSOC COMPUTING MACHINERY
Publication Year: 2024
Collection: Seoul National University: S-Space
Subject Terms: Insider Threat; Anomaly Detection
Description: This paper reports on methods and results of an applied research project by a team consisting of SAIC and four universities to develop, integrate, and evaluate new approaches to detect the weak signals characteristic of insider threats on organizations' information systems. Our system combines structural and semantic information from a real corporate database of monitored activity on their users' computers to detect independently developed red team inserts of malicious insider activities. We have developed and applied multiple algorithms for anomaly detection based on suspected scenarios of malicious insider behavior. indicators of unusual activities, high-dimensional statistical patterns, temporal sequences, and normal graph evolution, Algorithms and representations for dynamic graph processing provide the ability to scale as needed for enterprise-level deployments on real-time data streams. We have also developed a visual language for specifying combinations of features, baselines, peer groups, time periods, and algorithms to detect anomalies suggestive of instances of insider threat behavior. We defined over 100 data features in seven categories based on approximately 5.5 million actions per day from approximately 5,500 users, We have achieved area under the ROC eurve values of up to 0,979 and lift values of 65 on the top 50 user-days identified on two months of real data. ; N ; 1
Document Type: article in journal/newspaper; report
Language: unknown
ISBN: 978-0-00-502730-1; 0-00-502730-6
Relation: https://hdl.handle.net/10371/201075; 000502730600166; 211022
Availability: https://hdl.handle.net/10371/201075
Accession Number: edsbas.488AFF76
Database: BASE