用于不平衡内部威胁检测的深度时间图信息集

IF 2.5 4区 管理学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Journal of Computer Information Systems Pub Date : 2023-10-18 DOI:10.1080/08874417.2023.2267510
Peng Gao, Haotian Zhang, Ming Wang, Weiyong Yang, Xinshen Wei, Zhuo Lv, Zengzhou Ma
{"title":"用于不平衡内部威胁检测的深度时间图信息集","authors":"Peng Gao, Haotian Zhang, Ming Wang, Weiyong Yang, Xinshen Wei, Zhuo Lv, Zengzhou Ma","doi":"10.1080/08874417.2023.2267510","DOIUrl":null,"url":null,"abstract":"ABSTRACTInsider threats pose a significant concern for critical information infrastructures. Graph neural networks are widely used for detection due to their ability to model complex relationships among network entities. However, deep learning algorithms struggle with learning from business system data as anomalies are extremely rare. To tackle this challenge, we propose deep temporal graph infomax (DTGI), a new method for detecting insider threats in real-world scenarios with highly imbalanced data. DTGI utilizes an extended continuous-time dynamic heterogeneous graph network and a behavior context constraint anomaly sample generator. This generator incorporates attack behavior context constraints to augment attack samples and enhance the performance of the supervised model. Extensive experiments conducted on the CERT dataset, consisting of over one million records, demonstrate that DTGI surpasses state-of-the-art methods in terms of detection performance.KEYWORDS: Insider threatanomaly detectiondynamic graphgraph neural networkgraph contrastive learning Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationFundingThis work is supported by the State Grid Science and Technology Project [Project No.5108-202224046A-1-1-ZN].","PeriodicalId":54855,"journal":{"name":"Journal of Computer Information Systems","volume":"70 1","pages":"0"},"PeriodicalIF":2.5000,"publicationDate":"2023-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Deep Temporal Graph Infomax for Imbalanced Insider Threat Detection\",\"authors\":\"Peng Gao, Haotian Zhang, Ming Wang, Weiyong Yang, Xinshen Wei, Zhuo Lv, Zengzhou Ma\",\"doi\":\"10.1080/08874417.2023.2267510\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"ABSTRACTInsider threats pose a significant concern for critical information infrastructures. Graph neural networks are widely used for detection due to their ability to model complex relationships among network entities. However, deep learning algorithms struggle with learning from business system data as anomalies are extremely rare. To tackle this challenge, we propose deep temporal graph infomax (DTGI), a new method for detecting insider threats in real-world scenarios with highly imbalanced data. DTGI utilizes an extended continuous-time dynamic heterogeneous graph network and a behavior context constraint anomaly sample generator. This generator incorporates attack behavior context constraints to augment attack samples and enhance the performance of the supervised model. Extensive experiments conducted on the CERT dataset, consisting of over one million records, demonstrate that DTGI surpasses state-of-the-art methods in terms of detection performance.KEYWORDS: Insider threatanomaly detectiondynamic graphgraph neural networkgraph contrastive learning Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationFundingThis work is supported by the State Grid Science and Technology Project [Project No.5108-202224046A-1-1-ZN].\",\"PeriodicalId\":54855,\"journal\":{\"name\":\"Journal of Computer Information Systems\",\"volume\":\"70 1\",\"pages\":\"0\"},\"PeriodicalIF\":2.5000,\"publicationDate\":\"2023-10-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Computer Information Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1080/08874417.2023.2267510\",\"RegionNum\":4,\"RegionCategory\":\"管理学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Computer Information Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/08874417.2023.2267510","RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

内部威胁是关键信息基础设施面临的一个重要问题。图神经网络由于能够对网络实体之间的复杂关系进行建模而被广泛用于检测。然而,深度学习算法很难从业务系统数据中学习,因为异常非常罕见。为了应对这一挑战,我们提出了深度时序图信息集(DTGI),这是一种在数据高度不平衡的现实场景中检测内部威胁的新方法。DTGI利用扩展的连续时间动态异构图网络和行为上下文约束异常样本生成器。该生成器结合了攻击行为上下文约束,以增加攻击样本并提高监督模型的性能。在CERT数据集上进行的大量实验,包括超过一百万条记录,表明DTGI在检测性能方面超过了最先进的方法。关键词:内部威胁异常检测动态图形神经网络对比学习披露声明作者未报告潜在的利益冲突。本研究由国家电网科技计划项目[项目No.5108-202224046A-1-1-ZN]资助。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Deep Temporal Graph Infomax for Imbalanced Insider Threat Detection
ABSTRACTInsider threats pose a significant concern for critical information infrastructures. Graph neural networks are widely used for detection due to their ability to model complex relationships among network entities. However, deep learning algorithms struggle with learning from business system data as anomalies are extremely rare. To tackle this challenge, we propose deep temporal graph infomax (DTGI), a new method for detecting insider threats in real-world scenarios with highly imbalanced data. DTGI utilizes an extended continuous-time dynamic heterogeneous graph network and a behavior context constraint anomaly sample generator. This generator incorporates attack behavior context constraints to augment attack samples and enhance the performance of the supervised model. Extensive experiments conducted on the CERT dataset, consisting of over one million records, demonstrate that DTGI surpasses state-of-the-art methods in terms of detection performance.KEYWORDS: Insider threatanomaly detectiondynamic graphgraph neural networkgraph contrastive learning Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationFundingThis work is supported by the State Grid Science and Technology Project [Project No.5108-202224046A-1-1-ZN].
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Journal of Computer Information Systems
Journal of Computer Information Systems COMPUTER SCIENCE, INFORMATION SYSTEMS-
CiteScore
6.80
自引率
7.10%
发文量
82
审稿时长
>12 weeks
期刊介绍: The Journal of Computer Information Systems (JCIS) aims to publish manuscripts that explore information systems and technology research and thus develop computer information systems globally. We encourage manuscripts that cover the following topic areas: -Analytics, Business Intelligence, Decision Support Systems in Computer Information Systems - Mobile Technology, Mobile Applications - Human-Computer Interaction - Information and/or Technology Management, Organizational Behavior & Culture - Data Management, Data Mining, Database Design and Development - E-Commerce Technology and Issues in computer information systems - Computer systems enterprise architecture, enterprise resource planning - Ethical and Legal Issues of IT - Health Informatics - Information Assurance and Security--Cyber Security, Cyber Forensics - IT Project Management - Knowledge Management in computer information systems - Networks and/or Telecommunications - Systems Analysis, Design, and/or Implementation - Web Programming and Development - Curriculum Issues, Instructional Issues, Capstone Courses, Specialized Curriculum Accreditation - E-Learning Technologies, Analytics, Future
期刊最新文献
Human Activity Recognition with Unsupervised Learning of Event Logs Predicting Cross-Selling Health Insurance Products Using Machine-Learning Techniques Navigating Cybersecurity: Environment’s Impact on Standards Adoption and Board Involvement Consumer Segmentation and Decision: Explainable Machine Learning Insights A Configurational Approach to CSP Selection and Rejection
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1