Journal: Proceedings Of The 2nd International Conference On Intelligent Computing And Emerging Technologies (icet-2016)
ISSN Number:
0
Downloads
13
Views
Abstract
Insider threats remain one of the oldest and notorious threats to information security. Early detection remains key to preventing insider attacks on an information system. The vast amount of enterprise data and the little data points pertaining to insider threats calls for techniques to handle the rare class problem. This study conceptualised insider threat data as a streaming data problem. Scalability of insider threat detection systems represents a gap in knowledge in this disposition. Building on existing unsupervised ensemble stream mining techniques, this study proposed an insider threat detection algorithm and evaluated it using Centre for Analysis of Internet Data (CAIDA) Anonymized trace dataset for 2015. CAIDA datasets was used to ascertain the scalability of quantised dictionary construction by applying a distributive approach to graph based anomaly detection (GBAD). Pattern learning anomaly detection system processes GBAD in a streaming approach. Dictionary construction was done using Apache Spark on top of the Hadoop stack.
Pattern Learning Anomaly Detection System (PLADS) enhanced GBAD successfully discovered the same anomalous substructure within a streaming approach in a fraction of the time (642 seconds) it took to process the entire graph (59,743 seconds) when applied on the CAIDA Anonymised 2015 dataset. Application of Apache Spark as the distributed computing framework for construction of quantised dictionaries of user command data depicted a reduction in processing time under varying input sizes and number of reducers In conclusion, scalability of Insider Threat Detection systems is essential and a complexity analysis of proposed algorithms showed it scales to increased number of users of the system. The implemented prototype system using Apache Spark scaled to increasing workloads showing its usefulness for early detection of insider threats. This study recommends the use of unsupervised learning ensembles and distributed frameworks for effective detection of insider threats.
AJAYI,A. Ajayi,O. IDOWU,S. OGBONNA,C. Otusile,O. Ajayi,I. ABEL,S. .
(2016). Multilevel Scalability for Effective Detection of Insider Threats, 2
(), 120-120.
AJAYI,A. Ajayi,O. IDOWU,S. OGBONNA,C. Otusile,O. Ajayi,I. ABEL,S. .
"Multilevel Scalability for Effective Detection of Insider Threats" 2, no (), (2016):
120-120.
AJAYI,A. and Ajayi,O. and IDOWU,S. and OGBONNA,C. and Otusile,O. and Ajayi,I. and ABEL,S. and .
(2016). Multilevel Scalability for Effective Detection of Insider Threats, 2
(), pp120-120.
AJAYIA, AjayiO, IDOWUS, OGBONNAC, OtusileO, AjayiI, ABELS, .
Multilevel Scalability for Effective Detection of Insider Threats. 2016, 2
():120-120.
AJAYI,Adebowale ,
Ajayi,Olutayo ,
IDOWU,Sunday ,
OGBONNA,Chibueze ,
Otusile,Oluwabukola ,
Ajayi,Ibironke ,
and ABEL,Samuel
.
"Multilevel Scalability for Effective Detection of Insider Threats", 2 . (2016) :
120-120.
[1]
A.Adebowale A.Olutayo I.Sunday O.Chibueze O.Oluwabukola A.Ibironke & A.Samuel ,
"Multilevel Scalability for Effective Detection of Insider Threats"
vol.2,
no.,
pp. 120-120,
2016.