پروفایل بندی کارمندان از طریق شبکه
ترجمه نشده

پروفایل بندی کارمندان از طریق شبکه

عنوان فارسی مقاله: پروفایل بندی کارمندان از طریق شبکه و تمایل مبتنی بر جنبه برای شناسایی تهدیدات خودی
عنوان انگلیسی مقاله: Employee profiling via aspect-based sentiment and network for insider threats detection
مجله/کنفرانس: سیستم های خبره با کابردهای مربوطه – Expert Systems with Applications
رشته های تحصیلی مرتبط: مهندسی کامپیوتر، مدیریت
گرایش های تحصیلی مرتبط: مهندسی الگوریتم و محاسبات، مدیریت کسب و کار
کلمات کلیدی فارسی: تهدید خودی، تجزیه و تحلیل تمایل مبتنی بر جنبه، تعبیه شبکه، شناسایی ناهنجاری
کلمات کلیدی انگلیسی: Insider threat، Aspect-based sentiment analysis، Network embedding، Anomaly detection
نوع نگارش مقاله: مقاله پژوهشی (Research Article)
شناسه دیجیتال (DOI): https://doi.org/10.1016/j.eswa.2019.05.043
دانشگاه: Nanyang Technological University, Singapore
صفحات مقاله انگلیسی: 11
ناشر: الزویر - Elsevier
نوع ارائه مقاله: ژورنال
نوع مقاله: ISI
سال انتشار مقاله: 2019
ایمپکت فاکتور: 5.891 در سال 2018
شاخص H_index: 162 در سال 2019
شاخص SJR: 1.190 در سال 2018
شناسه ISSN: 0957-4174
شاخص Quartile (چارک): Q1 در سال 2018
فرمت مقاله انگلیسی: PDF
وضعیت ترجمه: ترجمه نشده است
قیمت مقاله انگلیسی: رایگان
آیا این مقاله بیس است: خیر
آیا این مقاله مدل مفهومی دارد: ندارد
آیا این مقاله پرسشنامه دارد: ندارد
آیا این مقاله متغیر دارد: ندارد
کد محصول: E13575
رفرنس: دارای رفرنس در داخل متن و انتهای مقاله
فهرست مطالب (انگلیسی)

Abstract

1. Introduction

2. Related work

3. Methodology

4. Evaluation

5. Conclusions and future work

CRediT authorship contribution statement

Declaration of Competing Interest

Appendix A. Supplementary materials

References

بخشی از مقاله (انگلیسی)

Abstract

Historically, the harm caused by insiders has proven to be one of the greatest concerns for any organization. As such, it has received considerable attention from both the industrial and research communities. Existing works mainly focused on modeling the employees’ normal biometric behavior (e.g., human to device interaction pattern) to detect anomalous behavior which corresponds to the insider activity. However, it is unattainable to stop the insider at the final moment when the malicious act is being carried out. In this paper, we propose a novel framework which performs employee profiling based on aspect-based sentiments and social network information and examine its applicability for early detection of potential insider threats. On the contrary to the traditional sentiment analysis, aspect-based sentiment analysis provides more fine-grained information on the employee. Our framework employs a combination of deep learning techniques such as Gated Recurrent Unit (GRU) and skipgram to build temporal sentiment profiles for the employees. It then performs anomaly detection on the profiles and ranks the employees based on their respective anomaly score. Due to the absence of relevant benchmark dataset, we augmented the publicly available real-world Enron email corpus with an insider threat scenario to evaluate our framework. The evaluation results demonstrate that the augmentation is indeed reflected in the augmented employee’s anomaly ranking (i.e., from normal to abnormal) and her close associates are indeed placed closely to her when the profiles are visualized in the 2D space. The profiles obtained from our framework can also be used to complement any existing expert and intelligent systems with additional capabilities in handling textual information such as, integration with profiles obtained from biometric behavior to form a more comprehensive threat detection system.

Introduction

Today, insider threat has become one of the major concerns for organizations. Insiders are people with authorized access to sensitive information in an organization. The trust afforded to employees, while necessary for them to perform their tasks, exposes the organization to a wide range of insider attacks. It was reported that the damage an insider could have dealt to an organization is far worse compared to outsider attacks and could cost as much as $26.5 million1. Despite the extensive effort from both the industrial and research communities to combat the threats, there is a rising trend in all variations of insider threats2. In particular, the cases of sabotage insider attacks, such as the recent Tesla case,3 have increased by over 60% over the past two years (Ponemon, 2011). A large majority of the existing defense solutions focus on modeling the employees’ normal biometric behavior (e.g., mouse and keyboard usage) and/or network logs to detect anomalous behavior (Liu, De Vel, Han, Zhang, & Xiang, 2018). However, typical organization has a complex infrastructure and is comprised of a mix of people from different backgrounds, where each of them may have a different role in the organization. For these reasons, the insider threat problem is considerably more elusive than any other threats that the organization faces and cannot be addressed by technological means alone.