Visible to the public Automated Insider Threat Detection System Using User and Role-Based Profile Assessment

TitleAutomated Insider Threat Detection System Using User and Role-Based Profile Assessment
Publication TypeJournal Article
Year of Publication2017
AuthorsLegg, P. A., Buckley, O., Goldsmith, M., Creese, S.
JournalIEEE Systems Journal
Volume11
Pagination503–512
Date Publishedjun
ISSN1932-8184
Keywordsanomaly detection, authorisation, authorized data access, automated insider threat detection system, business data processing, business reputation, Collaboration, computer security, cyber security, Data analysis, data visualisation, Electronic mail, feature extraction, financial theft, Human Behavior, human factors, insider threat, insider threats, intellectual property, intellectual property theft, Intrusion Detection Systems, Metrics, organisational aspects, Organizations, policy-based governance, psychology, pubcrawl, Resiliency, role-based profile assessment, sensitive organizational data access, synthetic data-driven scenarios, tree data structures, tree-structure profiling, user behavior, user profile assessment, visual analytics tools
Abstract

Organizations are experiencing an ever-growing concern of how to identify and defend against insider threats. Those who have authorized access to sensitive organizational data are placed in a position of power that could well be abused and could cause significant damage to an organization. This could range from financial theft and intellectual property theft to the destruction of property and business reputation. Traditional intrusion detection systems are neither designed nor capable of identifying those who act maliciously within an organization. In this paper, we describe an automated system that is capable of detecting insider threats within an organization. We define a tree-structure profiling approach that incorporates the details of activities conducted by each user and each job role and then use this to obtain a consistent representation of features that provide a rich description of the user's behavior. Deviation can be assessed based on the amount of variance that each user exhibits across multiple attributes, compared against their peers. We have performed experimentation using ten synthetic data-driven scenarios and found that the system can identify anomalous behavior that may be indicative of a potential threat. We also show how our detection system can be combined with visual analytics tools to support further investigation by an analyst.

URLhttps://ieeexplore.ieee.org/document/7126970
DOI10.1109/JSYST.2015.2438442
Citation Keylegg_automated_2017