[1]WANG Peichao,ZHOU Yun,ZHU Cheng,et al.Analysis on abnormal behavior of insider threats based on accesslog mining[J].CAAI Transactions on Intelligent Systems,2017,12(6):781-789.[doi:10.11992/tis.201706041]
Copy
CAAI Transactions on Intelligent Systems[ISSN 1673-4785/CN 23-1538/TP] Volume:
12
Number of periods:
2017 6
Page number:
781-789
Column:
学术论文—机器学习
Public date:
2017-12-25
- Title:
-
Analysis on abnormal behavior of insider threats based on accesslog mining
- Author(s):
-
WANG Peichao; ZHOU Yun; ZHU Cheng; HUANG Jincai; ZHANG Weiming
-
Key Laboratory of Information System Engineering, National University of Defense Technology, Changsha 410072, China
-
- Keywords:
-
access control system; accesslog mining; insider threat detection; analysis on abnormal behavior
- CLC:
-
TP311
- DOI:
-
10.11992/tis.201706041
- Abstract:
-
Using an access control system is an important method of guarding key places, and it can effectively prohibit the entry of unauthorized users. However, many recent cases indicate that threats to key places mostly come from insiders. To address this challenge, this paper proposes a method for analyzing the abnormal behavior of insider threats based on accesslog data mining. First, the PrefixSpan algorithm is used to extract normal behavior sequences; then, the anomaly scores of the access sequences are calculated. Finally, the abnormal sequences are identified according to a threshold determined by decision makers. Experiments on real access data show that this method can decrease high false alarm rates caused by an exact match when there is limited data and can also effectively reveal abnormal behavior by insiders. Therefore, this method provides a new approach for enhancing the protection of key places.