System Misuse Detection via Informed Behavior Clustering and Modeling

07/01/2019
by   Linara Adilova, et al.
0

One of the main tasks of cybersecurity is recognizing malicious interactions with an arbitrary system. Currently, the logging information from each interaction can be collected in almost unrestricted amounts, but identification of attacks requires a lot of effort and time of security experts. We propose an approach for identifying fraud activity through modeling normal behavior in interactions with a system via machine learning methods, in particular LSTM neural networks. In order to enrich the modeling with system specific knowledge, we propose to use an interactive visual interface that allows security experts to identify semantically meaningful clusters of interactions. These clusters incorporate domain knowledge and lead to more precise behavior modeling via informed machine learning. We evaluate the proposed approach on a dataset containing logs of interactions with an administrative interface of login and security server. Our empirical results indicate that the informed modeling is capable of capturing normal behavior, which can then be used to detect abnormal behavior.

READ FULL TEXT
research
02/12/2015

Discovering Human Interactions in Videos with Limited Data Labeling

We present a novel approach for discovering human interactions in videos...
research
07/02/2022

Informed Learning by Wide Neural Networks: Convergence, Generalization and Sampling Complexity

By integrating domain knowledge with labeled samples, informed machine l...
research
08/08/2020

A novel hand-held interface supporting the self-management of Type 1 diabetes

The paper describes the interaction design of a hand-held interface supp...
research
12/14/2016

Anomaly Detection Using the Knowledge-based Temporal Abstraction Method

The rapid growth in stored time-oriented data necessitates the developme...
research
07/18/2020

Deep Learning of High-Order Interactions for Protein Interface Prediction

Protein interactions are important in a broad range of biological proces...
research
11/27/2020

Task Programming: Learning Data Efficient Behavior Representations

Specialized domain knowledge is often necessary to accurately annotate t...
research
07/30/2020

Detecting Suspicious Behavior: How to Deal with Visual Similarity through Neural Networks

Suspicious behavior is likely to threaten security, assets, life, or fre...

Please sign up or login with your details

Forgot password? Click here to reset