Chia-Mei Chen, Sung-Yu Huang, Zheng-Xun Cai, Ya-Hui Ou, Jiunn-Wu Lin
{"title":"利用无监督学习检测供应链攻击","authors":"Chia-Mei Chen, Sung-Yu Huang, Zheng-Xun Cai, Ya-Hui Ou, Jiunn-Wu Lin","doi":"10.1109/ICASI57738.2023.10179583","DOIUrl":null,"url":null,"abstract":"The number of documented supply chain attacks has increased over six times nowadays, and the types of supply chain attacks have diversified. Organizations grant suppliers privileged user accounts to perform their tasks which hold the keys to unlocking internal networks. Privilege escalation is a key step for attackers to penetrate a target system network, which makes privileged user accounts attractive to adversaries. This study employs unsupervised machine learning techniques to profile privileged users’ normal behaviors and develops a risk score function to identify their anomalies. The proposed solution has been evaluated with real data, and the experimental results demonstrate that it could discover the anomalies efficiently.","PeriodicalId":281254,"journal":{"name":"2023 9th International Conference on Applied System Innovation (ICASI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Detecting Supply Chain Attacks with Unsupervised Learning\",\"authors\":\"Chia-Mei Chen, Sung-Yu Huang, Zheng-Xun Cai, Ya-Hui Ou, Jiunn-Wu Lin\",\"doi\":\"10.1109/ICASI57738.2023.10179583\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The number of documented supply chain attacks has increased over six times nowadays, and the types of supply chain attacks have diversified. Organizations grant suppliers privileged user accounts to perform their tasks which hold the keys to unlocking internal networks. Privilege escalation is a key step for attackers to penetrate a target system network, which makes privileged user accounts attractive to adversaries. This study employs unsupervised machine learning techniques to profile privileged users’ normal behaviors and develops a risk score function to identify their anomalies. The proposed solution has been evaluated with real data, and the experimental results demonstrate that it could discover the anomalies efficiently.\",\"PeriodicalId\":281254,\"journal\":{\"name\":\"2023 9th International Conference on Applied System Innovation (ICASI)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-04-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 9th International Conference on Applied System Innovation (ICASI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICASI57738.2023.10179583\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 9th International Conference on Applied System Innovation (ICASI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICASI57738.2023.10179583","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Detecting Supply Chain Attacks with Unsupervised Learning
The number of documented supply chain attacks has increased over six times nowadays, and the types of supply chain attacks have diversified. Organizations grant suppliers privileged user accounts to perform their tasks which hold the keys to unlocking internal networks. Privilege escalation is a key step for attackers to penetrate a target system network, which makes privileged user accounts attractive to adversaries. This study employs unsupervised machine learning techniques to profile privileged users’ normal behaviors and develops a risk score function to identify their anomalies. The proposed solution has been evaluated with real data, and the experimental results demonstrate that it could discover the anomalies efficiently.