skip to main content
10.1145/2808783.2808784acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article
Public Access

Detecting Insider Threat from Enterprise Social and Online Activity Data

Published: 16 October 2015 Publication History

Abstract

Insider threat is a significant security risk for organizations. In this paper, we attempt to discover insider threat by identifying abnormal behavior in enterprise social and online activity data of employees. To this end, we process and extract relevant features that are possibly indicative of insider threat behavior. This includes features extracted from social data including email communication patterns and content, and online activity data such as web browsing patterns, email frequency, and file and machine access patterns. Subsequently, we detect statistically abnormal behavior with respect to these features using state-of-the-art anomaly detection methods, and declare this abnormal behavior as a proxy for insider threat activity. We test our approach on a real world data set with artificially injected insider threat events. We obtain a ROC score of 0.77, which shows that our proposed approach is fairly successful in identifying insider threat events. Finally, we build a visualization dashboard that enables managers and HR personnel to quickly identify employees with high threat risk scores which will enable them to take suitable preventive measures and limit security risk.

References

[1]
William Eberle, Jeffrey Graves, and Lawrence Holder. Insider threat detection using a graph-based approach. Journal of Applied Security Research, 6(1):32--81, 2010.
[2]
Frank L Greitzer, Lars J Kangas, Christine F Noonan, and Angela C Dalton. Identifying at-risk employees: A behavioral model for predicting potential insider threats. Pacific Northwest National Laboratory Richland, WA, 2010.
[3]
Miltiadis Kandias, Alexios Mylonas, Nikos Virvilis, Marianthi Theoharidou, and Dimitris Gritzalis. An insider threat prediction model. In Trust, privacy and security in digital business, pages 26--37. Springer, 2010.
[4]
Fei Tony Liu, Kai Ming Ting, and Zhi-Hua Zhou. Isolation forest. In Data Mining, 2008. ICDM'08. Eighth IEEE International Conference on, pages 413--422. IEEE, 2008.
[5]
Teresa F Lunt. A survey of intrusion detection techniques. Computers & Security, 12(4):405--418, 1993.
[6]
GB Magklaras and SM Furnell. Insider threat prediction tool: Evaluating the probability of it misuse. Computers & Security, 21(1):62--73, 2001.
[7]
Sunu Mathew, Michalis Petropoulos, Hung Q Ngo, and Shambhu Upadhyaya. A data-centric approach to insider attack detection in database systems. In Recent Advances in Intrusion Detection, pages 382--401. Springer, 2010.
[8]
Alex Memory, Henry G Goldberg, and E Ted. Context-aware insider threat detection. In Workshops at the Twenty-Seventh AAAI Conference on Artificial Intelligence, 2013.
[9]
Robert F Mills, Michael R Grimaila, Gilbert L Peterson, and Jonathan W Butts. A scenario-based approach to mitigating the insider threat. Technical report, DTIC Document, 2011.

Cited By

View all

Index Terms

  1. Detecting Insider Threat from Enterprise Social and Online Activity Data

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    MIST '15: Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats
    October 2015
    90 pages
    ISBN:9781450338240
    DOI:10.1145/2808783
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 16 October 2015

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. anomaly detection
    2. enterprise social data
    3. insider threat detection

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    CCS'15
    Sponsor:

    Acceptance Rates

    MIST '15 Paper Acceptance Rate 6 of 14 submissions, 43%;
    Overall Acceptance Rate 21 of 54 submissions, 39%

    Upcoming Conference

    CCS '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)378
    • Downloads (Last 6 weeks)30
    Reflects downloads up to 28 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)Contextual Sequence-Based User Behavior Anomaly DetectionIEEE Access10.1109/ACCESS.2025.354350013(35539-35554)Online publication date: 2025
    • (2025)Evaluation of Machine Learning Algorithm and SMOTE for Insider Threat DetectionIntelligent Computing Systems10.1007/978-3-031-82931-4_23(303-318)Online publication date: 27-Feb-2025
    • (2024)BRITD: behavior rhythm insider threat detection with time awareness and user adaptationCybersecurity10.1186/s42400-023-00190-97:1Online publication date: 2-Jan-2024
    • (2024)Security Anomaly Detection in Enterprise GitHubPractice and Experience in Advanced Research Computing 2024: Human Powered Computing10.1145/3626203.3670591(1-5)Online publication date: 17-Jul-2024
    • (2024)User Behavior Threat Detection Based on Adaptive Sliding Window GANIEEE Transactions on Network and Service Management10.1109/TNSM.2024.335569821:2(2493-2503)Online publication date: Apr-2024
    • (2024)Towards More Effective Insider Threat Countermeasures: A Survey of Approaches for Addressing Challenges and Limitations2024 IEEE International Systems Conference (SysCon)10.1109/SysCon61195.2024.10553441(1-8)Online publication date: 15-Apr-2024
    • (2024)Insider Threat Detection: A Review2024 International Conference on Networking and Network Applications (NaNA)10.1109/NaNA63151.2024.00031(147-153)Online publication date: 9-Aug-2024
    • (2024)Anomaly Detection in Security Logs using Sequence ModelingNOMS 2024-2024 IEEE Network Operations and Management Symposium10.1109/NOMS59830.2024.10575561(1-9)Online publication date: 6-May-2024
    • (2024)TabSec: A Collaborative Framework for Novel Insider Threat Detection2024 IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA)10.1109/ISPA63168.2024.00277(2030-2037)Online publication date: 30-Oct-2024
    • (2024)Enhancing Insider Threat Detection in Imbalanced Cybersecurity Settings Using the Density-Based Local Outlier Factor AlgorithmIEEE Access10.1109/ACCESS.2024.337369412(34820-34834)Online publication date: 2024
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media