Anomaly Detection with Graph Convolutional Networks for Insider Threat and Fraud Detection
Title | Anomaly Detection with Graph Convolutional Networks for Insider Threat and Fraud Detection |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Jiang, Jianguo, Chen, Jiuming, Gu, Tianbo, Choo, Kim-Kwang Raymond, Liu, Chao, Yu, Min, Huang, Weiqing, Mohapatra, Prasant |
Conference Name | MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM) |
Date Published | Nov. 2019 |
Publisher | IEEE |
ISBN Number | 978-1-7281-4280-7 |
Keywords | anomaly detection, anomaly detection applications, anomaly detection model, associated threat groups, composability, convolutional neural nets, Data models, edge detection, feature extraction, fraud, fraud detection, GCN, graph convolutional networks, graph theory, Image edge detection, Insider Threat Detection, learning (artificial intelligence), machine learning, malicious threat groups, Metrics, Organizations, pubcrawl, real-world insider threat data, Resiliency, Scalability, security, security of data |
Abstract | Anomaly detection generally involves the extraction of features from entities' or users' properties, and the design of anomaly detection models using machine learning or deep learning algorithms. However, only considering entities' property information could lead to high false positives. We posit the importance of also considering connections or relationships between entities in the detecting of anomalous behaviors and associated threat groups. Therefore, in this paper, we design a GCN (graph convolutional networks) based anomaly detection model to detect anomalous behaviors of users and malicious threat groups. The GCN model could characterize entities' properties and structural information between them into graphs. This allows the GCN based anomaly detection model to detect both anomalous behaviors of individuals and associated anomalous groups. We then evaluate the proposed model using a real-world insider threat data set. The results show that the proposed model outperforms several state-of-art baseline methods (i.e., random forest, logistic regression, SVM, and CNN). Moreover, the proposed model can also be applied to other anomaly detection applications. |
URL | https://ieeexplore.ieee.org/document/9020760 |
DOI | 10.1109/MILCOM47813.2019.9020760 |
Citation Key | jiang_anomaly_2019 |
- graph theory
- security of data
- security
- Scalability
- Resiliency
- real-world insider threat data
- pubcrawl
- Organizations
- Metrics
- malicious threat groups
- machine learning
- learning (artificial intelligence)
- Insider Threat Detection
- Image edge detection
- Anomaly Detection
- graph convolutional networks
- GCN
- fraud detection
- fraud
- feature extraction
- edge detection
- Data models
- convolutional neural nets
- composability
- associated threat groups
- anomaly detection model
- anomaly detection applications