Deep Learning for Insider Threat Detection: Review, Challenges and
Opportunities
- URL: http://arxiv.org/abs/2005.12433v1
- Date: Mon, 25 May 2020 22:48:01 GMT
- Title: Deep Learning for Insider Threat Detection: Review, Challenges and
Opportunities
- Authors: Shuhan Yuan and Xintao Wu
- Abstract summary: Advanced deep learning techniques provide a new paradigm to learn end-to-end models from complex data.
The existing studies show that compared with traditional machine learning algorithms, deep learning models can improve the performance of insider threat detection.
Applying deep learning to further advance the insider threat detection task still faces several limitations, such as lack of labeled data, adaptive attacks.
- Score: 22.976960488191505
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Insider threats, as one type of the most challenging threats in cyberspace,
usually cause significant loss to organizations. While the problem of insider
threat detection has been studied for a long time in both security and data
mining communities, the traditional machine learning based detection
approaches, which heavily rely on feature engineering, are hard to accurately
capture the behavior difference between insiders and normal users due to
various challenges related to the characteristics of underlying data, such as
high-dimensionality, complexity, heterogeneity, sparsity, lack of labeled
insider threats, and the subtle and adaptive nature of insider threats.
Advanced deep learning techniques provide a new paradigm to learn end-to-end
models from complex data. In this brief survey, we first introduce one
commonly-used dataset for insider threat detection and review the recent
literature about deep learning for such research. The existing studies show
that compared with traditional machine learning algorithms, deep learning
models can improve the performance of insider threat detection. However,
applying deep learning to further advance the insider threat detection task
still faces several limitations, such as lack of labeled data, adaptive
attacks. We then discuss such challenges and suggest future research directions
that have the potential to address challenges and further boost the performance
of deep learning for insider threat detection.
Related papers
- Adversarial Challenges in Network Intrusion Detection Systems: Research Insights and Future Prospects [0.33554367023486936]
This paper provides a comprehensive review of machine learning-based Network Intrusion Detection Systems (NIDS)
We critically examine existing research in NIDS, highlighting key trends, strengths, and limitations.
We discuss emerging challenges in the field and offer insights for the development of more robust and resilient NIDS.
arXiv Detail & Related papers (2024-09-27T13:27:29Z) - Progressing from Anomaly Detection to Automated Log Labeling and
Pioneering Root Cause Analysis [53.24804865821692]
This study introduces a taxonomy for log anomalies and explores automated data labeling to mitigate labeling challenges.
The study envisions a future where root cause analysis follows anomaly detection, unraveling the underlying triggers of anomalies.
arXiv Detail & Related papers (2023-12-22T15:04:20Z) - Assaying on the Robustness of Zero-Shot Machine-Generated Text Detectors [57.7003399760813]
We explore advanced Large Language Models (LLMs) and their specialized variants, contributing to this field in several ways.
We uncover a significant correlation between topics and detection performance.
These investigations shed light on the adaptability and robustness of these detection methods across diverse topics.
arXiv Detail & Related papers (2023-12-20T10:53:53Z) - Few-shot Weakly-supervised Cybersecurity Anomaly Detection [1.179179628317559]
We propose an enhancement to an existing few-shot weakly-supervised deep learning anomaly detection framework.
This framework incorporates data augmentation, representation learning and ordinal regression.
We then evaluated and showed the performance of our implemented framework on three benchmark datasets.
arXiv Detail & Related papers (2023-04-15T04:37:54Z) - A Hybrid Deep Learning Anomaly Detection Framework for Intrusion
Detection [4.718295605140562]
We propose a three-stage deep learning anomaly detection based network intrusion attack detection framework.
The framework comprises an integration of unsupervised (K-means clustering), semi-supervised (GANomaly) and supervised learning (CNN) algorithms.
We then evaluated and showed the performance of our implemented framework on three benchmark datasets.
arXiv Detail & Related papers (2022-12-02T04:40:54Z) - Robustness Evaluation of Deep Unsupervised Learning Algorithms for
Intrusion Detection Systems [0.0]
This paper evaluates the robustness of six recent deep learning algorithms for intrusion detection on contaminated data.
Our experiments suggest that the state-of-the-art algorithms used in this study are sensitive to data contamination and reveal the importance of self-defense against data perturbation.
arXiv Detail & Related papers (2022-06-25T02:28:39Z) - Adversarial Machine Learning In Network Intrusion Detection Domain: A
Systematic Review [0.0]
It has been found that deep learning models are vulnerable to data instances that can mislead the model to make incorrect classification decisions.
This survey explores the researches that employ different aspects of adversarial machine learning in the area of network intrusion detection.
arXiv Detail & Related papers (2021-12-06T19:10:23Z) - Inspect, Understand, Overcome: A Survey of Practical Methods for AI
Safety [54.478842696269304]
The use of deep neural networks (DNNs) in safety-critical applications is challenging due to numerous model-inherent shortcomings.
In recent years, a zoo of state-of-the-art techniques aiming to address these safety concerns has emerged.
Our paper addresses both machine learning experts and safety engineers.
arXiv Detail & Related papers (2021-04-29T09:54:54Z) - Increasing the Confidence of Deep Neural Networks by Coverage Analysis [71.57324258813674]
This paper presents a lightweight monitoring architecture based on coverage paradigms to enhance the model against different unsafe inputs.
Experimental results show that the proposed approach is effective in detecting both powerful adversarial examples and out-of-distribution inputs.
arXiv Detail & Related papers (2021-01-28T16:38:26Z) - Deep Learning for Anomaly Detection: A Review [150.9270911031327]
This paper surveys the research of deep anomaly detection with a comprehensive taxonomy, covering advancements in three high-level categories and 11 fine-grained categories of the methods.
We review their key intuitions, objective functions, underlying assumptions, advantages and disadvantages, and discuss how they address the aforementioned challenges.
arXiv Detail & Related papers (2020-07-06T02:21:16Z) - Survey of Network Intrusion Detection Methods from the Perspective of
the Knowledge Discovery in Databases Process [63.75363908696257]
We review the methods that have been applied to network data with the purpose of developing an intrusion detector.
We discuss the techniques used for the capture, preparation and transformation of the data, as well as, the data mining and evaluation methods.
As a result of this literature review, we investigate some open issues which will need to be considered for further research in the area of network security.
arXiv Detail & Related papers (2020-01-27T11:21:05Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.