Visible to the public Anomaly Detection with Graph Convolutional Networks for Insider Threat and Fraud Detection

TitleAnomaly Detection with Graph Convolutional Networks for Insider Threat and Fraud Detection
Publication TypeConference Paper
Year of Publication2019
AuthorsJiang, Jianguo, Chen, Jiuming, Gu, Tianbo, Choo, Kim-Kwang Raymond, Liu, Chao, Yu, Min, Huang, Weiqing, Mohapatra, Prasant
Conference NameMILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)
Date PublishedNov. 2019
PublisherIEEE
ISBN Number978-1-7281-4280-7
Keywordsanomaly detection, anomaly detection applications, anomaly detection model, associated threat groups, composability, convolutional neural nets, Data models, edge detection, feature extraction, fraud, fraud detection, GCN, graph convolutional networks, graph theory, Image edge detection, Insider Threat Detection, learning (artificial intelligence), machine learning, malicious threat groups, Metrics, Organizations, pubcrawl, real-world insider threat data, Resiliency, Scalability, security, security of data
Abstract

Anomaly detection generally involves the extraction of features from entities' or users' properties, and the design of anomaly detection models using machine learning or deep learning algorithms. However, only considering entities' property information could lead to high false positives. We posit the importance of also considering connections or relationships between entities in the detecting of anomalous behaviors and associated threat groups. Therefore, in this paper, we design a GCN (graph convolutional networks) based anomaly detection model to detect anomalous behaviors of users and malicious threat groups. The GCN model could characterize entities' properties and structural information between them into graphs. This allows the GCN based anomaly detection model to detect both anomalous behaviors of individuals and associated anomalous groups. We then evaluate the proposed model using a real-world insider threat data set. The results show that the proposed model outperforms several state-of-art baseline methods (i.e., random forest, logistic regression, SVM, and CNN). Moreover, the proposed model can also be applied to other anomaly detection applications.

URLhttps://ieeexplore.ieee.org/document/9020760
DOI10.1109/MILCOM47813.2019.9020760
Citation Keyjiang_anomaly_2019