首页> 外文期刊>Computational Social Systems, IEEE Transactions on >Behavioral Analysis of Insider Threat: A Survey and Bootstrapped Prediction in Imbalanced Data
【24h】

Behavioral Analysis of Insider Threat: A Survey and Bootstrapped Prediction in Imbalanced Data

机译:内部威胁行为分析:不平衡数据中的调查和自举预测

获取原文
获取原文并翻译 | 示例
           

摘要

The problem of insider threat is receiving increasing attention both within the computer science community as well as government and industry. This paper starts by presenting a broad, multidisciplinary survey of insider threat capturing contributions from computer scientists, psychologists, criminologists, and security practitioners. Subsequently, we present the behavioral analysis of insider threat () framework, in which we conduct a detailed experiment involving 795 subjects on Amazon Mechanical Turk (AMT) in order to gauge the behaviors that real human subjects follow when attempting to exfiltrate data from within an organization. In the real world, the number of actual insiders found is very small, so supervised machine-learning methods encounter a challenge. Unlike past works, we develop bootstrapping algorithms that learn from highly imbalanced data, mostly unlabeled, and almost no history of user behavior from an insider threat perspective. We develop and evaluate seven algorithms using and show that they can produce a realistic (and acceptable) balance of precision and recall.
机译:内部威胁的问题正在计算机科学界以及政府和行业中引起越来越多的关注。本文首先介绍计算机科学家,心理学家,犯罪学家和安全从业人员对内部威胁捕获的广泛,多学科的调查。随后,我们介绍了内部威胁()框架的行为分析,在该框架中,我们进行了涉及795名Amazon Mechanical Turk(AMT)上受试者的详细实验,以评估真实人类受试者试图从内部人员中窃取数据时遵循的行为。组织。在现实世界中,发现的实际内部人员数量很少,因此,受监督的机器学习方法面临挑战。与过去的工作不同,我们开发了自举算法,该算法从高度失衡的数据中学习,这些数据大多是未标记的,而且从内部威胁角度来看几乎没有用户行为的历史。我们使用以下方法开发和评估了7种算法,并证明它们可以在精度和召回率之间达到现实(且可以接受)的平衡。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号