Visible to the public Discovering Insider Threats from Log Data with High-Performance Bioinformatics Tools

TitleDiscovering Insider Threats from Log Data with High-Performance Bioinformatics Tools
Publication TypeConference Paper
Year of Publication2016
AuthorsWurzenberger, Markus, Skopik, Florian, Fiedler, Roman, Kastner, Wolfgang
Conference NameProceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4571-2
Keywordsanomaly detection, Damage Assessment, insider threat, log data clustering, Network reconnaissance, Outlier detection, pubcrawl, Resiliency
Abstract

Since the number of cyber attacks by insider threats and the damage caused by them has been increasing over the last years, organizations are in need for specific security solutions to counter these threats. To limit the damage caused by insider threats, the timely detection of erratic system behavior and malicious activities is of primary importance. We observed a major paradigm shift towards anomaly-focused detection mechanisms, which try to establish a baseline of system behavior - based on system logging data - and report any deviations from this baseline. While these approaches are promising, they usually have to cope with scalability issues. As the amount of log data generated during IT operations is exponentially growing, high-performance security solutions are required that can handle this huge amount of data in real time. In this paper, we demonstrate how high-performance bioinformatics tools can be leveraged to tackle this issue, and we demonstrate their application to log data for outlier detection, to timely detect anomalous system behavior that points to insider attacks.

URLhttp://doi.acm.org/10.1145/2995959.2995973
DOI10.1145/2995959.2995973
Citation Keywurzenberger_discovering_2016