skip to main content
10.1145/3627377.3627414acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicbdtConference Proceedingsconference-collections
research-article

Improved Insider Threat Detection Method of University Cluster System based on Log-Clustering

Published: 04 December 2023 Publication History

Abstract

In response to the low accuracy issue of the log-based clustering method for insider threat detection in university cluster systems, this study proposes an improved log-based clustering method for insider threat detection. Firstly, when dividing logs into log sequences, we consider the differences between different users. We classify the logs based on user accounts and use a sliding window approach to divide the classified logs into labeled log sequences for subsequent clustering learning. This approach takes into account the behavioral pattern differences between different users. Additionally, in practical applications, the output results of the model are manually inspected, misjudgments are marked, and the model is iterated using the labeled data to improve its accuracy. Experimental results demonstrate that the improved internal threat detection method effectively enhances the detection accuracy and is more suitable for real-world production environments.

References

[1]
Jiachang Huang. 2019. Discussion on security risk and countermeasures of university station group system. Information and Computer (Theory), 31, 21, 212-214. (in Chinese)
[2]
Xiaofu Zhu. 2019. Discussion on key technologies of security level protection of university website group. Digital Technology and Application, 37, 3, 207-236. (in Chinese)
[3]
Le D C and Zincir-Heywood A N. 2018. Evaluating insider threat detection workflow using supervised and unsupervised learning. IEEE Security and Privacy Workshops (SPW), San Francisco, CA, USA, 270-275, https://doi.org/10.1109/SPW.2018.00043
[4]
Pinjia He, Jieming Zhu, Shilin He, Jian Li and Michael R. Lyu. 2018. Towards Automated Log Parsing for Large-Scale Log Data Analysis. IEEE Transactions on Dependable and Secure Computing, 15, 6, (Nov.-Dec. 2018), 931-944. https://doi.org/10.1109/TDSC.2017.2762673
[5]
Shi Ying, Bingming Wang, Lu Wang, Qingshan Li, Yishi Zhao, Jianga Shang, Hao Huang, Guoli Cheng, Zhe Yang and Jianyi Geng. 2021. An improved KNN-based efficient log anomaly detection method with automatically labeled samples. ACM Transactions on Knowledge Discovery from Data (TKDD), 15, 3, 1-22. https://doi.org/10.1145/3441448
[6]
Wei Xu, Ling Huang, Armando Fox, David Patterson, and Michael I. Jordan. 2009. Detecting large-scale system problems by mining console logs. In Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles (SOSP '09). Association for Computing Machinery, New York, NY, USA, 117–132. https://doi.org/10.1145/1629575.1629587
[7]
Jian-Guang Lou, Qiang Fu, Shengqi Yang, Ye Xu, and Jiang Li. 2010. Mining invariants from console logs for system problem detection. In Proceedings of the 2010 USENIX conference on USENIX annual technical conference (USENIXATC'10). USENIX Association, USA, 24.
[8]
Risto Vaarandi and Mauno Pihelgas. 2015. LogCluster - A data clustering and pattern mining algorithm for event logs. 2015 11th International Conference on Network and Service Management (CNSM), Barcelona, Spain, pp. 1-7, https://doi.org/10.1109/CNSM.2015.7367331
[9]
Shenglin Zhang, 2017. Syslog processing for switch failure diagnosis and prediction in datacenter networks. 2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS), Vilanova i la Geltrú, Spain, 2017, pp. 1-10, https://doi.org/10.1109/IWQoS.2017.7969130
[10]
C. D. Manning, P. Raghavan and H. Schütze. 2008. Introduction to Information Retrieval, Cambridge University Press, 2008.
[11]
J. C. Gower and G. J. S. Ross. 1969. Minimum Spanning Trees and Single Linkage Cluster Analysis, Journal of the Royal Statistical Society Series C: Applied Statistics. 18, 1, (March 1969), 54–64, https://doi.org/10.2307/2346439

Cited By

View all
  • (2024)Landscape and Taxonomy of Online Parser-Supported Log Anomaly Detection MethodsIEEE Access10.1109/ACCESS.2024.338728712(78193-78218)Online publication date: 2024

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICBDT '23: Proceedings of the 2023 6th International Conference on Big Data Technologies
September 2023
441 pages
ISBN:9798400707667
DOI:10.1145/3627377
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 December 2023

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Insider threat detection
  2. Log anomaly detection
  3. Machine learning
  4. University website cluster system
  5. Unsupervised learning

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICBDT 2023

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)19
  • Downloads (Last 6 weeks)2
Reflects downloads up to 27 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Landscape and Taxonomy of Online Parser-Supported Log Anomaly Detection MethodsIEEE Access10.1109/ACCESS.2024.338728712(78193-78218)Online publication date: 2024

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media