论文标题
广告:应用于细粒级别内部威胁检测的归因图边序的异常检测
ADSAGE: Anomaly Detection in Sequences of Attributed Graph Edges applied to insider threat detection at fine-grained level
论文作者
论文摘要
关于CERT INSIDER威胁检测案例的先前工作已经忽略了图形和文本功能,尽管它们与描述用户行为相关。此外,现有系统在很大程度上依靠功能工程和审计数据聚合来检测恶意活动。这很耗时,需要专家知识并防止追踪警报以精确的用户操作。为了解决这些问题,我们引入了广告,以检测以图形边缘模型的审核日志事件中的异常。我们的一般方法是第一个在边缘级别执行异常检测的同时支持边缘序列和属性,这可以是数字,分类甚至文本。我们描述了如何将广告用于CERT用例中不同审核日志中的细粒度,事件级内部内部威胁检测。指出证书问题没有标准的基准,我们使用基于基于召回的指标的先前提出的评估设置。我们评估来自CERT INSIDER威胁数据集以及现实世界认证事件的身份验证,电子邮件流量和网络浏览日志的广告。广告可有效地检测身份验证的异常,以用户为模型的计算机交互以及电子邮件通信。简单的基线也可以令人惊讶地效果。我们还报告了CERT数据集中存在的恶意场景的绩效:有趣的是,几个探测器是互补的,可以合并以改善检测。总体而言,我们的结果表明,图表功能可以表征恶意内部活动的特征,并且可以在细粒度水平上进行检测。
Previous works on the CERT insider threat detection case have neglected graph and text features despite their relevance to describe user behavior. Additionally, existing systems heavily rely on feature engineering and audit data aggregation to detect malicious activities. This is time consuming, requires expert knowledge and prevents tracing back alerts to precise user actions. To address these issues we introduce ADSAGE to detect anomalies in audit log events modeled as graph edges. Our general method is the first to perform anomaly detection at edge level while supporting both edge sequences and attributes, which can be numeric, categorical or even text. We describe how ADSAGE can be used for fine-grained, event level insider threat detection in different audit logs from the CERT use case. Remarking that there is no standard benchmark for the CERT problem, we use a previously proposed evaluation setting based on realistic recall-based metrics. We evaluate ADSAGE on authentication, email traffic and web browsing logs from the CERT insider threat datasets, as well as on real-world authentication events. ADSAGE is effective to detect anomalies in authentications, modeled as user to computer interactions, and in email communications. Simple baselines give surprisingly strong results as well. We also report performance split by malicious scenarios present in the CERT datasets: interestingly, several detectors are complementary and could be combined to improve detection. Overall, our results show that graph features are informative to characterize malicious insider activities, and that detection at fine-grained level is possible.