Syed Khurram Jah Rizvi, Khawaja Faisal Javed, Muhammad Moazam
{"title":"CAS - Attention based ISO/IEC 15408–2 Compliant Continuous Audit System for Insider Threat Detection","authors":"Syed Khurram Jah Rizvi, Khawaja Faisal Javed, Muhammad Moazam","doi":"10.1109/ICAI58407.2023.10136657","DOIUrl":null,"url":null,"abstract":"Enterprises are facing information security threats to intranet-based infrastructure and allied systems from external as well as insider cyber actors. A lot of research has been done to identify the evil insiders and prevent their malicious acts. Moreover, there are many others challenges such as limited availability of real labeled data, variations in organizational nature and emerging zero-day attempts from insiders. Therefore, new approaches are essentially required to combat Information Security (IS) non-complaint behavior and emerging insider cyber threats. To this end, we proposed a novel information security auditing-based system for insider threat detection. Unlike traditional audit approaches, this novel approach is based on continuous auditing system. The approach also fulfills the requirements of with ISO/IEC 15408–2 auditing standard. Moreover, system also proposed deep attention neural network to classify the trusted and untrusted users based on the generated activity logs. We evaluated CAS on the defacto dataset for insider threat detection i.e., CERT. 6.2. Evaluation results show that the proposed model learns from real-world data sets to detect IS non-complaint actions to classify the untrusted insider. The proposed model achieved an accuracy of more than 97% and outpaced traditional machine learning approaches.","PeriodicalId":161809,"journal":{"name":"2023 3rd International Conference on Artificial Intelligence (ICAI)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 3rd International Conference on Artificial Intelligence (ICAI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAI58407.2023.10136657","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Enterprises are facing information security threats to intranet-based infrastructure and allied systems from external as well as insider cyber actors. A lot of research has been done to identify the evil insiders and prevent their malicious acts. Moreover, there are many others challenges such as limited availability of real labeled data, variations in organizational nature and emerging zero-day attempts from insiders. Therefore, new approaches are essentially required to combat Information Security (IS) non-complaint behavior and emerging insider cyber threats. To this end, we proposed a novel information security auditing-based system for insider threat detection. Unlike traditional audit approaches, this novel approach is based on continuous auditing system. The approach also fulfills the requirements of with ISO/IEC 15408–2 auditing standard. Moreover, system also proposed deep attention neural network to classify the trusted and untrusted users based on the generated activity logs. We evaluated CAS on the defacto dataset for insider threat detection i.e., CERT. 6.2. Evaluation results show that the proposed model learns from real-world data sets to detect IS non-complaint actions to classify the untrusted insider. The proposed model achieved an accuracy of more than 97% and outpaced traditional machine learning approaches.