Next Article in Journal
Research on Low-Voltage Ride-Through and Intelligent Optimization Control of Wind Turbines Based on Hybrid Power Prediction Models
Previous Article in Journal
A Significant Wave Height Prediction Method Based on Improved Temporal Convolutional Network and Attention Mechanism
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Detect Insider Threat with Associated Session Graph

by
Junmei Ding
1,*,
Peng Qian
2,†,
Jing Ma
3,
Zhiqiang Wang
4,
Yueming Lu
1 and
Xiaqing Xie
5
1
School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876, China
2
College of Computer Science and Technology, Zhejiang University, Hangzhou 310058, China
3
Department of Computer Science, Hong Kong Baptist University, Hong Kong, China
4
Department of Cyberspace Security, Beijing Electronic Science and Technology Institute, Beijing 100070, China
5
Key Laboratory of Trustworthy Distributed Computing and Service, Ministry of Education, Beijing University of Posts and Telecommunications, Beijing 100876, China
*
Author to whom correspondence should be addressed.
Current address: Goplus Open Research, Hangzhou 310007, China.
Electronics 2024, 13(24), 4885; https://doi.org/10.3390/electronics13244885
Submission received: 17 October 2024 / Revised: 5 December 2024 / Accepted: 8 December 2024 / Published: 11 December 2024

Abstract

Insider threats pose significant risks to organizational security, often leading to severe data breaches and operational disruptions. While foundational, traditional detection methods suffer from limitations such as labor-intensive rule creation, lack of scalability, and vulnerability to evasion by sophisticated attackers. Recent advancements in graph-based approaches have shown promise by leveraging behavior analysis for threat detection. However, existing methods frequently oversimplify session behaviors and fail to extract fine-grained features, which are critical for identifying subtle malicious activities. In this paper, we propose a novel approach that integrates session graphs to capture multi-level fine-grained behavioral features. First, seven heuristic rules are defined to transform user activities across different hosts and sessions into an associated session graph while extracting features at both the activity and session levels. Furthermore, to highlight critical nodes in the associated session graph, we introduce a graph node elimination technique to normalize the graph. Finally, a graph convolutional network is employed to extract features from the normalized graph and generate behavior detection results. Extensive experiments on the CERT insider threat dataset demonstrate the superiority of our approach, achieving an accuracy of 99% and an F1-score of 99%, significantly outperforming state-of-the-art models. The ASG method also reduces false positive rates and enhances the detection of subtle malicious behaviors, addressing key limitations of existing graph-based methods. These findings highlight the potential of ASG for real-world applications such as enterprise network monitoring and anomaly detection, and suggest avenues for future research into adaptive learning mechanisms and real-time detection capabilities.
Keywords: insider threat; behavior analysis; anomaly detection; session graph; graph neural network insider threat; behavior analysis; anomaly detection; session graph; graph neural network

Share and Cite

MDPI and ACS Style

Ding, J.; Qian, P.; Ma, J.; Wang, Z.; Lu, Y.; Xie, X. Detect Insider Threat with Associated Session Graph. Electronics 2024, 13, 4885. https://doi.org/10.3390/electronics13244885

AMA Style

Ding J, Qian P, Ma J, Wang Z, Lu Y, Xie X. Detect Insider Threat with Associated Session Graph. Electronics. 2024; 13(24):4885. https://doi.org/10.3390/electronics13244885

Chicago/Turabian Style

Ding, Junmei, Peng Qian, Jing Ma, Zhiqiang Wang, Yueming Lu, and Xiaqing Xie. 2024. "Detect Insider Threat with Associated Session Graph" Electronics 13, no. 24: 4885. https://doi.org/10.3390/electronics13244885

APA Style

Ding, J., Qian, P., Ma, J., Wang, Z., Lu, Y., & Xie, X. (2024). Detect Insider Threat with Associated Session Graph. Electronics, 13(24), 4885. https://doi.org/10.3390/electronics13244885

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop