通信学报 ›› 2016, Vol. 37 ›› Issue (Z1): 180-188.doi: 10.11959/j.issn.1000-436x.2016265

• 学术论文 • 上一篇    下一篇

基于业务过程挖掘的内部威胁检测系统

朱泰铭1,2,郭渊博1,2,琚安康1,2,马骏1,2   

  1. 1 解放军信息工程大学网络空间安全学院,河南 郑州 450001
    2 数学工程与先进计算国家重点实验室,江苏 无锡 214000
  • 出版日期:2016-10-25 发布日期:2017-01-17
  • 基金资助:
    国家自然科学基金资助项目

Business process mining based insider threat detection system

Tai-ming ZHU1,2,Yuan-bo GUO1,2,An-kang JU1,2,Jun MA1,2   

  1. 1 School of Cyberspace Security,PLA Information Engineering University,Zhengzhou 450001,China
    2 State Key Laboratory of Mathematical Engineering and Advanced Computing,Wuxi 214000,China
  • Online:2016-10-25 Published:2017-01-17
  • Supported by:
    The National Natural Science Foundation of China

摘要:

当前的入侵检测系统更多针对的是外部攻击者,但有时内部人员也会给机构或组织的信息安全带来巨大危害。现有的内部威胁检测方法通常未将人员行为和业务活动进行结合,威胁检测率有待提升。从内部威胁的实施方和威胁对系统业务的影响这2个方面着手,提出基于业务过程挖掘的内部威胁检测系统模型。首先通过对训练日志的挖掘建立系统业务活动的正常控制流模型和各业务执行者的正常行为轮廓,然后在系统运行过程中将执行者的实际操作行为与预建立的正常行为轮廓进行对比,并加以业务过程的控制流异常检测和性能异常检测,以发现内部威胁。对各种异常行为进行了定义并给出了相应的检测算法,并基于ProM平台进行实验,结果证明了所设计系统的有效性。

关键词: 内部威胁, 过程挖掘, 行为轮廓, 异常检测

Abstract:

Current intrusion detection systems are mostly for detecting external attacks,but sometimes the internal staff may bring greater harm to organizations in information security.Traditional insider threat detection methods of-ten do not combine the behavior of people with business activities,making the threat detection rate to be improved.An insider threat detection system based on business process mining from two aspects was proposed,the implementation of insider threats and the impact of threats on system services.Firstly,the normal control flow model of business ac-tivities and the normal behavior profile of each operator were established by mining the training log.Then,the actual behavior of the operators was compared with the pre-established normal behavior contours during the operation of the system,which was supplemented by control flow anomaly detection and performance anomaly detection of business processes,in order to discover insider threats.A variety of anomalies were defined and the corresponding detection algorithms were given.Experiments were performed on the ProM platform.The results show the designed system is effective.

Key words: insider threat, process mining, behavior profile, anomaly detection

No Suggested Reading articles found!