Unformatted text preview:

Evolving Insider Threat DetectionOutlineSlide 3Insider Threat Detection using unsupervised Learning based on GraphOutlines: Unsupervised LearningSlide 6Insider Threat is a real threatInsider Threat : ContinueSlide 9Related workRelated Approaches and comparison with proposed solutionsWhy Unsupervised Learning?Why Stream MiningProposed MethodGBAD ApproachUnsupervised Pattern DiscoveryThree types of anomaliesExample of graph with normative pattern and different types of anomaliesSlide 19Characteristics of Data StreamDataStream ClassificationEnsemble of ClassifiersProposed Ensemble based Insider Threat Detection (EIT)Ensemble based Classification of Data Streams (unsupervised Learning--GBAD)EIT –U pseudocodeExperimentsA Sample system call record from MIT Lincoln DatasetToken Sub-graphSlide 29Performance Contd..Slide 31Slide 32Slide 33Slide 34Evolving Insider Threat Detection using Supervised LearningSlide 36Outlines: Supervised LearningSlide 38Why one class SVMSlide 40One class SVM (OCSVM)Slide 44Ensemble based Classification of Data Streams (supervised Learning)EIT –S pseudo code (Testing)EIT –S pseudocodeFeature Set extractedPERFORMANCE…..Slide 50Slide 51Conclusion & Future WorkPublicationReferencesThank YouEvolving Insider Threat Evolving Insider Threat DetectionDetectionPallabi ParveenDr. Bhavani Thuraisingham (Advisor)Dept of Computer ScienceUniversity of Texas at DallasFunded by AFOSROutlineOutlineEvolving Insider threat DetectionUnsupervised LearningSupervised learningjSystem traces System Traces weeki+1weekiEvolving Insider Threat DetectionSystem log Anomaly?Feature Extraction& SelectionTesting on Data fromweeki+1Online learning Gather Data fromWeekiFeature Extraction& SelectionLearning algorithmSupervised - One class SVM, OCSVMUnsupervised - Graph based Anomaly detection, GBADEnsemble based Stream MiningEnsemble of ModelsUpdate modelsInsider Threat Detection Insider Threat Detection using unsupervised using unsupervised Learning based on GraphLearning based on GraphOutlines: Unsupervised LearningOutlines: Unsupervised LearningInsider ThreatRelated WorkProposed MethodExperiments & ResultsDefinition of an Insider An Insider is someone who exploits, or has the intention to exploit, their legitimate access to assets for unauthorised purposesInsider Threat is a real threatInsider Threat is a real threatComputer Crime and Security Survey 2001$377 million financial losses due to attacks49% reported incidents of unauthorized network access by insidersInsider Threat : ContinueInsider Threat : ContinueInsider threat◦Detection◦PreventionDetection based approach: ◦Unsupervised learning, Graph Based Anomaly Detection◦Ensembles based Stream MiningFeature Extraction& Selection Anomaly?jSystem traces System Traces weeki+1weekiEvolving Insider Threat DetectionSystem logTesting on Data fromweeki+1Online learning Gather Data fromWeekiFeature Extraction& SelectionLearning algorithmSupervised - One class SVM, OCSVMUnsupervised - Graph based Anomaly detection, GBADEnsemble based Stream MiningEnsemble of ModelsUpdate modelsRelated workRelated work"Intrusion Detection Using Sequences of System Calls," Supervised learning by Hofmeyr "Mining for Structural Anomalies in Graph-Based Data Representations (GBAD) for Insider Threat Detection." Unsupervised learning by Staniford-Chen and Lawrence HolderAll are static in nature. Cannot learn from evolving Data streamRelated Approaches and comparison with Related Approaches and comparison with proposed solutions proposed solutions Techniques Proposed ByChallengesSupervised/UnsupervisedConcept-drift Insider Threat Graph-basedForrest, Hofmeyr Supervised X √ XMasud , Fan (Stream Mining) Supervised √ N/A N/ALiu Unsupervised X √ XHolder (GBAD) Unsupervised X √ √Our Approach (EIT)Unsupervised √ √ √Why Unsupervised Learning?Why Unsupervised Learning?One approach to detecting insider threat is supervised learning where models are built from training data.Approximately .03% of the training data is associated with insider threats (minority class)While 99.97% of the training data is associated with non insider threat (majority class). Unsupervised learning is an alternative for this.Why Stream MiningWhy Stream MiningAll are static in nature. Cannot learn from evolving Data streamData ChunkPrevious decision boundaryCurrent decision boundary Data StreamAnomaly DataNormal DataInstances victim of concept driftProposed MethodProposed MethodGraph based anomaly detection (GBAD, Unsupervised learning) [2]Graph based anomaly detection (GBAD, Unsupervised learning) [2]Ensemble based Stream MiningGBAD ApproachGBAD ApproachDetermine normative pattern S using SUBDUE minimum description length (MDL) heuristic that minimizes:M(S,G) = DL(G|S) + DL(S)Unsupervised Pattern DiscoveryUnsupervised Pattern DiscoveryGraph compression and theminimum description length (MDL)principleThe best graphical pattern S minimizes the description length of S and the description length of the graph G compressed with pattern Swhere description length DL(S) is the minimum number of bits needed to represent S (SUBDUE)Compression can be based on inexact matches to pattern))|()((min SGDLSDLSS1S1S1S1S1S2S2S2Three types of anomaliesThree types of anomaliesThree algorithms for handling each of the different anomaly categories using Graph compression and the minimum description length (MDL) principle:1. GBAD-MDL finds anomalous modifications2. GBAD-P (Probability) finds anomalous insertions3. GBAD-MPS (Maximum Partial Substructure) finds anomalous deletionsExample of graph with normative pattern Example of graph with normative pattern and different types of anomaliesand different types of anomaliesA BCDGA BCDA BEDA BCDA BCD GBAD-MDL (modification) GBAD-P (insertion)GBAD-MPS (Deletion)GCGGNormativeStructureProposed MethodProposed MethodGraph based anomaly detection (GBAD, Unsupervised learning) Graph based anomaly detection (GBAD, Unsupervised learning) Ensemble based Stream MiningCharacteristics of Data StreamCharacteristics of Data Stream◦Continuous flow of dataNetwork trafficSensor dataCall center records◦Examples:DataStream ClassificationDataStream ClassificationEnsemble of ClassifiersEnsemble of ClassifiersC1C2C3x,?++-inputClassifierIndividual outputsvoting+Ensemble outputProposed Ensemble based Insider Proposed Ensemble based


View Full Document

UTD CS 6V81 - Evolving Insider Threat Detection

Documents in this Course
Botnets

Botnets

33 pages

Privacy

Privacy

27 pages

Privacy

Privacy

27 pages

Load more
Download Evolving Insider Threat Detection
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Evolving Insider Threat Detection and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Evolving Insider Threat Detection 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?