DocumentCode :
1425024
Title :
Detecting Anomalous Insiders in Collaborative Information Systems
Author :
Chen, You ; Nyemba, Steve ; Malin, Bradley
Author_Institution :
Dept. of Biomed. Inf., Vanderbilt Univ., Nashville, TN, USA
Volume :
9
Issue :
3
fYear :
2012
Firstpage :
332
Lastpage :
344
Abstract :
Collaborative information systems (CISs) are deployed within a diverse array of environments that manage sensitive information. Current security mechanisms detect insider threats, but they are ill-suited to monitor systems in which users function in dynamic teams. In this paper, we introduce the community anomaly detection system (CADS), an unsupervised learning framework to detect insider threats based on the access logs of collaborative environments. The framework is based on the observation that typical CIS users tend to form community structures based on the subjects accessed (e.g., patients´ records viewed by healthcare providers). CADS consists of two components: 1) relational pattern extraction, which derives community structures and 2) anomaly prediction, which leverages a statistical model to determine when users have sufficiently deviated from communities. We further extend CADS into MetaCADS to account for the semantics of subjects (e.g., patients´ diagnoses). To empirically evaluate the framework, we perform an assessment with three months of access logs from a real electronic health record (EHR) system in a large medical center. The results illustrate our models exhibit significant performance gains over state-of-the-art competitors. When the number of illicit users is low, MetaCADS is the best model, but as the number grows, commonly accessed semantics lead to hiding in a crowd, such that CADS is more prudent.
Keywords :
groupware; medical information systems; security of data; statistical analysis; unsupervised learning; CIS; MetaCADS; access logs; anomalous insider detection; anomaly prediction; collaborative information systems; community anomaly detection system; community structures; electronic health record; insider threat detection; medical center; relational pattern extraction; security mechanisms; statistical model; unsupervised learning framework; Artificial intelligence; Collaboration; Communities; Design automation; Matrix decomposition; Medical services; Semantics; Privacy; data mining; insider threat detection.; social network analysis;
fLanguage :
English
Journal_Title :
Dependable and Secure Computing, IEEE Transactions on
Publisher :
ieee
ISSN :
1545-5971
Type :
jour
DOI :
10.1109/TDSC.2012.11
Filename :
6133296
Link To Document :
بازگشت