"AD2: Anomaly detection on active directory log data for insider threat monitoring"
Title | "AD2: Anomaly detection on active directory log data for insider threat monitoring" |
Publication Type | Conference Paper |
Year of Publication | 2015 |
Authors | C. H. Hsieh, C. M. Lai, C. H. Mao, T. C. Kao, K. C. Lee |
Conference Name | 2015 International Carnahan Conference on Security Technology (ICCST) |
Date Published | Sept |
Publisher | IEEE |
ISBN Number | 978-1-4799-8691-0 |
Accession Number | 15729643 |
Keywords | active directory domain service log, Active Directory Log Analysis, active directory log data, AD2, advanced persistent threat, anomaly detection, behavioral analytic framework, behavioral modeling, behavioural sciences computing, Computational modeling, computer security, cyber security monitoring, Data models, Hidden Markov models, insider threat monitoring, invasive software, learning (artificial intelligence), machine learning, malware detection system, Markov processes, Monitoring, Organizations, probability, pubcrawl170101 |
Abstract | What you see is not definitely believable is not a rare case in the cyber security monitoring. However, due to various tricks of camouflages, such as packing or virutal private network (VPN), detecting "advanced persistent threat"(APT) by only signature based malware detection system becomes more and more intractable. On the other hand, by carefully modeling users' subsequent behaviors of daily routines, probability for one account to generate certain operations can be estimated and used in anomaly detection. To the best of our knowledge so far, a novel behavioral analytic framework, which is dedicated to analyze Active Directory domain service logs and to monitor potential inside threat, is now first proposed in this project. Experiments on real dataset not only show that the proposed idea indeed explores a new feasible direction for cyber security monitoring, but also gives a guideline on how to deploy this framework to various environments. |
URL | http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7389698&isnumber=7389647 |
DOI | 10.1109/CCST.2015.7389698 |
Citation Key | 7389698 |
- Data models
- pubcrawl170101
- probability
- Organizations
- Monitoring
- Markov processes
- malware detection system
- machine learning
- learning (artificial intelligence)
- invasive software
- insider threat monitoring
- Hidden Markov models
- active directory domain service log
- cyber security monitoring
- computer security
- Computational modeling
- behavioural sciences computing
- Behavioral Modeling
- behavioral analytic framework
- Anomaly Detection
- advanced persistent threat
- AD2
- active directory log data
- Active Directory Log Analysis