Results From Invoking Artificial Neural Networks to Measure Insider Threat Detection & Mitigation

Author:

Williams Adam D.1,Abbott Shannon N.1,Shoman Nathan1,Charlton William S.2

Affiliation:

1. Sandia National Laboratories

2. University of Texas, Nuclear Engineering Teaching Laboratory

Abstract

Advances on differentiating between malicious intent and natural “organizational evolution” to explain observed anomalies in operational workplace patterns suggest benefit from evaluating collective behaviors observed in the facilities to improve insider threat detection and mitigation (ITDM). Advances in artificial neural networks (ANN) provide more robust pathways for capturing, analyzing, and collating disparate data signals into quantitative descriptions of operational workplace patterns. In response, a joint study by Sandia National Laboratories and the University of Texas at Austin explored the effectiveness of commercial artificial neural network (ANN) software to improve ITDM. This research demonstrates the benefit of learning patterns of organizational behaviors, detecting off-normal (or anomalous) deviations from these patterns, and alerting when certain types, frequencies, or quantities of deviations emerge for improving ITDM. Evaluating nearly 33,000 access control data points and over 1,600 intrusion sensor data points collected over a nearly twelve-month period, this study's results demonstrated the ANN could recognize operational patterns at the Nuclear Engineering Teaching Laboratory (NETL) and detect off-normal behaviors—suggesting that ANNs can be used to support a data-analytic approach to ITDM. Several representative experiments were conducted to further evaluate these conclusions, with the resultant insights supporting collective behavior-based analytical approaches to quantitatively describe insider threat detection and mitigation.

Publisher

Association for Computing Machinery (ACM)

Subject

General Medicine

Reference31 articles.

1. Federal Register Vol. 76 No. 198. 2011. Presidential documents. Retrieved from https://www.dni.gov/files/NCSC/documents/nittf/EO_13587.pdf.

2. International Atomic Energy Agency. 2008. Preventive and Protective Measures Against Insider Threats . IAEA Nuclear Security Series No. 8: Implementing Guide.

3. World Institute for Nuclear Security. 2018. Countering Violent Extremism and Insider Threats in the Nuclear Sector .

Cited by 5 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. OPIN-ITP: Optimized Physics Informed Network with Trimmed Score Regression Based Insider Threats Prediction in Cloud Computing;ICST Transactions on Scalable Information Systems;2024-07-31

2. MetaPoL: Immersive VR based Indoor Patterns of Life (PoL) and Anomalies Data Generation for Insider Threat Modeling in Nuclear Security;2024 25th IEEE International Conference on Mobile Data Management (MDM);2024-06-24

3. Enhancing false negative and positive rates for efficient insider threat detection;Computers & Security;2023-03

4. Research Opportunity of Insider Threat Detection based on Machine Learning Methods;2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC);2023-02-20

5. Insider Intrusion Detection Techniques: A State-of-the-Art Review;Journal of Computer Information Systems;2023-02-14

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3