DocumentCode :
2757120
Title :
Leveraging social networks to detect anomalous insider actions in collaborative environments
Author :
You Chen ; Nyemba, S. ; Zhang, Wen ; Malin, Bradley
Author_Institution :
Dept. of Biomed. Inf., Vanderbilt Univ., Nashville, TN, USA
fYear :
2011
fDate :
10-12 July 2011
Firstpage :
119
Lastpage :
124
Abstract :
Collaborative information systems (CIS) enable users to coordinate efficiently over shared tasks. They are often deployed in complex dynamic systems that provide users with broad access privileges, but also leave the system vulnerable to various attacks. Techniques to detect threats originating from beyond the system are relatively mature, but methods to detect insider threats are still evolving. A promising class of insider threat detection models for CIS focus on the communities that manifest between users based on the usage of common subjects in the system. However, current methods detect only when a user´s aggregate behavior is intruding, not when specific actions have deviated from expectation. In this paper, we introduce a method called specialized network anomaly detection (SNAD) to detect such events. SNAD assembles the community of users that access a particular subject and assesses if similarities of the community with and without a certain user are sufficiently different. We present a theoretical basis and perform an extensive empirical evaluation with the access logs of two distinct environments: those of a large electronic health record system (6,015 users, 130,457 patients and 1,327,500 accesses) and the editing logs of Wikipedia (2,388,955 revisors, 55,200 articles and 6,482,780 revisions). We compare SNAD with several competing methods and demonstrate it is significantly more effective: on average it achieves 20-30% greater area under an ROC curve.
Keywords :
groupware; information systems; security of data; social networking (online); CIS; ROC curve; SNAD; Wikipedia; access logs; anomalous insider actions detection; broad access privileges; collaborative environments; collaborative information systems; complex dynamic systems; detect threats; editing logs; electronic health record system; extensive empirical evaluation; insider threat detection models; leveraging social networks; shared tasks; specialized network anomaly detection; Analytical models; Atmospheric measurements; Automatic voltage control; Electronic publishing; Intrusion detection; Medical services;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Intelligence and Security Informatics (ISI), 2011 IEEE International Conference on
Conference_Location :
Beijing
Print_ISBN :
978-1-4577-0082-8
Type :
conf
DOI :
10.1109/ISI.2011.5984061
Filename :
5984061
Link To Document :
بازگشت