CAS - Attention based ISO/IEC 15408–2 Compliant Continuous Audit System for Insider Threat Detection

Syed Khurram Jah Rizvi, Khawaja Faisal Javed, Muhammad Moazam
{"title":"CAS - Attention based ISO/IEC 15408–2 Compliant Continuous Audit System for Insider Threat Detection","authors":"Syed Khurram Jah Rizvi, Khawaja Faisal Javed, Muhammad Moazam","doi":"10.1109/ICAI58407.2023.10136657","DOIUrl":null,"url":null,"abstract":"Enterprises are facing information security threats to intranet-based infrastructure and allied systems from external as well as insider cyber actors. A lot of research has been done to identify the evil insiders and prevent their malicious acts. Moreover, there are many others challenges such as limited availability of real labeled data, variations in organizational nature and emerging zero-day attempts from insiders. Therefore, new approaches are essentially required to combat Information Security (IS) non-complaint behavior and emerging insider cyber threats. To this end, we proposed a novel information security auditing-based system for insider threat detection. Unlike traditional audit approaches, this novel approach is based on continuous auditing system. The approach also fulfills the requirements of with ISO/IEC 15408–2 auditing standard. Moreover, system also proposed deep attention neural network to classify the trusted and untrusted users based on the generated activity logs. We evaluated CAS on the defacto dataset for insider threat detection i.e., CERT. 6.2. Evaluation results show that the proposed model learns from real-world data sets to detect IS non-complaint actions to classify the untrusted insider. The proposed model achieved an accuracy of more than 97% and outpaced traditional machine learning approaches.","PeriodicalId":161809,"journal":{"name":"2023 3rd International Conference on Artificial Intelligence (ICAI)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 3rd International Conference on Artificial Intelligence (ICAI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAI58407.2023.10136657","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Enterprises are facing information security threats to intranet-based infrastructure and allied systems from external as well as insider cyber actors. A lot of research has been done to identify the evil insiders and prevent their malicious acts. Moreover, there are many others challenges such as limited availability of real labeled data, variations in organizational nature and emerging zero-day attempts from insiders. Therefore, new approaches are essentially required to combat Information Security (IS) non-complaint behavior and emerging insider cyber threats. To this end, we proposed a novel information security auditing-based system for insider threat detection. Unlike traditional audit approaches, this novel approach is based on continuous auditing system. The approach also fulfills the requirements of with ISO/IEC 15408–2 auditing standard. Moreover, system also proposed deep attention neural network to classify the trusted and untrusted users based on the generated activity logs. We evaluated CAS on the defacto dataset for insider threat detection i.e., CERT. 6.2. Evaluation results show that the proposed model learns from real-world data sets to detect IS non-complaint actions to classify the untrusted insider. The proposed model achieved an accuracy of more than 97% and outpaced traditional machine learning approaches.
CAS -基于关注的ISO/IEC 15408-2内部威胁检测合规持续审核系统
企业正面临着来自外部和内部网络参与者对基于内部网的基础设施和相关系统的信息安全威胁。已经做了大量的研究来识别邪恶的内部人员并防止他们的恶意行为。此外,还有许多其他挑战,例如真实标记数据的可用性有限,组织性质的变化以及内部人员出现的零日攻击。因此,本质上需要新的方法来对抗信息安全(IS)无投诉行为和新兴的内部网络威胁。为此,我们提出了一种新的基于信息安全审计的内部威胁检测系统。与传统的审计方法不同,这种新方法是基于连续审计系统的。该方法还满足ISO/IEC 15408-2审计标准的要求。此外,基于生成的活动日志,系统还提出了深度关注神经网络对可信用户和不可信用户进行分类。我们在内部威胁检测的实际数据集(即CERT. 6.2)上评估了CAS。评估结果表明,该模型从真实世界的数据集中学习,以检测非投诉行为,从而对不可信的内部人员进行分类。该模型的准确率超过97%,超过了传统的机器学习方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信