Role-based differentiation for insider detection algorithms

  • Authors:
  • Suraj Nellikar;David M. Nicol;Jai J. Choi

  • Affiliations:
  • University of Illinois, Urbana-Champaign, IL, USA;University of Illinois, Urbana-Champaign, IL, USA;The Boeing Company, Seattle, WA, USA

  • Venue:
  • Proceedings of the 2010 ACM workshop on Insider threats
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Insider threat problems are widespread in industry today, resulting in large losses of intellectual property. Reputable reports assert that attacks from within an organization are on the rise, making detection of insider-based attacks a top priority. This paper evaluates the effectiveness of using role-based differentiation of user behavior as a tool in detecting insider attack behavior. This differentiation is natural in contexts where role-based access control (RBAC) mechanisms are in place. Using synthetically generated traffic (which puts placement and intensity of insider behavior under experimental control), we train five different algorithms on "normal" behavior with and without RBAC differentiation, and measure the accuracy of detecting malicious behavior with, and without RBAC, as a function of insider behavior. We find that in some contexts RBAC differentiation significantly reduces these errors. However, in our experiments two of the five algorithms had statistically significant increases in false positives under RBAC as opposed to non-RBAC. However, these increases are small compared to the very large gain in detection capability that RBAC brings, and we conclude that RBAC is very much worth considering as a tool for insider threat detection.