首页 | 本学科首页   官方微博 | 高级检索  
     


Anomaly Detection Based on Discrete Wavelet Transformation for Insider Threat Classification
Authors:Dong-Wook Kim  Gun-Yoon Shin  Myung-Mook Han
Affiliation:1 Department of Electrical and Electronics Engineering, V.S.B College of Engineering Technical Campus, Coimbatore, 642109, India2 Department of Electronics and Communication Engineering, Sri Ramakrishna Engineering College, Coimbatore, 641022, India
Abstract:Unlike external attacks, insider threats arise from legitimate users who belong to the organization. These individuals may be a potential threat for hostile behavior depending on their motives. For insider detection, many intrusion detection systems learn and prevent known scenarios, but because malicious behavior has similar patterns to normal behavior, in reality, these systems can be evaded. Furthermore, because insider threats share a feature space similar to normal behavior, identifying them by detecting anomalies has limitations. This study proposes an improved anomaly detection methodology for insider threats that occur in cybersecurity in which a discrete wavelet transformation technique is applied to classify normal vs. malicious users. The discrete wavelet transformation technique easily discovers new patterns or decomposes synthesized data, making it possible to distinguish between shared characteristics. To verify the efficacy of the proposed methodology, experiments were conducted in which normal users and malicious users were classified based on insider threat scenarios provided in Carnegie Mellon University’s Computer Emergency Response Team (CERT) dataset. The experimental results indicate that the proposed methodology with discrete wavelet transformation reduced the false-positive rate by 82% to 98% compared to the case with no wavelet applied. Thus, the proposed methodology has high potential for application to similar feature spaces.
Keywords:Anomaly detection  cybersecurity  discrete wavelet transformation  insider threat classification
点击此处可从《计算机系统科学与工程》浏览原始摘要信息
点击此处可从《计算机系统科学与工程》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号