Skip to main content
Log in

User-level malicious behavior analysis model based on the NMF-GMM algorithm and ensemble strategy

  • Original Paper
  • Published:
Nonlinear Dynamics Aims and scope Submit manuscript

Abstract

In the security supervision sector, it is the importance of accurate detection and analysis of insider threats. In this article, we propose a new concept of insider threat kill chain, which is capable to understand psychological and behavioral change process of malicious users. Meanwhile, a novel user-level malicious behavior analysis model is established based on non-negative matrix factorization-Gaussian mixture model (NMF-GMM). In particular, we carry out the analysis from three perspectives: typical malicious behavior characteristics, overall user behavior and temporal individual behavior change. New classification method suggests to use group users by targeting malicious users with typical malicious features. The Z-score method is applied to establish evaluation model of suspicious user behavior, and the threshold of normal behavior is also determined. Furthermore, a temporal individual behavior change model is established, malicious users are located by the Pettitt test method, and the time of the first malicious behaviors are given. Experimental results show that the proposed user grouping method and ensemble strategy is capable for detection of malicious users.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Algorithm 1
Algorithm 2
Algorithm 3
Algorithm 4
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Data availability

The data comes from Carnegie Mellon University’s Insider Threat Data Center (https://www.sei.cmu.edu). The experimental data can be provided by the corresponding author on reasonable request.

Abbreviations

NMF:

Non-negative Matrix Factorization

GMM:

Gaussian Mixture Model

NMF-GMM:

Non-negative Matrix Factorization- Gaussian Mixture Model

CERT:

Computer Emergency Response Team

IF:

Isolation Forest

OCSVM:

One-Class Support Vector Machine

R:

Recall

P:

Precision

F1:

F1-Score

FPR:

False Positive Rate

LOF:

Local Outlier Factor

CH:

Calinski-Harabasz Index

EM:

Expectation–Maximization

HMM:

Hidden Markov Model

References

  1. Glasser, J., Lindauer, B.: Bridging the gap: a pragmatic approach to generating insider threat data. Proceedings of the 2nd IEEE CS security and privacy workshops, pp. 98-104 (2013)

  2. Homoliak, I., Toffalini, F., Guarnizo, J., Elovici, Y., Ochoa, M.: Insight into insiders and IT: a survey of insider threat taxonomies, analysis, modeling, and countermeasures. ACM Comput. Surv. 52(2), 30 (2019)

    Google Scholar 

  3. Oladimeji, T.O., Ayo, C.K., Adewumi, S.E.: Insider threat detection using binary classification algorithms. IOP Conf. Series 1107, 012031 (2021)

    Article  Google Scholar 

  4. Yu, J., Kim, M., Oh, H., Yang, J.: Real-time abnormal insider event detection on enterprise resource planning systems via predictive auto-regression model. IEEE Access 9, 62276–62284 (2021)

    Article  Google Scholar 

  5. Yuan, S., Wu, X.: Deep learning for insider threat detection: review, challenges and opportunities. Comput. Secur. 104, 102221 (2021)

    Article  Google Scholar 

  6. Al-Mhiqani, M.N., Ahmad, R., Abidin, Z.Z., Yassin, W., Hassan, A., Abdulkareem, K.H., Ali, N.S., Yunos, Z.: A review of insider threat detection: classification, machine learning techniques, datasets, open challenges, and recommendations. Appl. Sci-Basel 10(15), 5208 (2020)

    Article  Google Scholar 

  7. Zou, B., Yang, M., Guo, J., Wang, J.B., Benjiamin, E.R., Liu, H., Li, W.: Insider threats of physical protection systems in nuclear power plants: prevention and evaluation. Prog. Nucl. Energ. 104, 8–15 (2018)

    Article  Google Scholar 

  8. Meng, W.Z., Choo, K.K.R., Furnell, S., Vasilakos, A.V., Probst, C.W.: Towards Bayesian-based trust management for insider attacks in healthcare software-defined networks. IEEE Trans. Netw. Serv. Man. 15(2), 761–773 (2018)

    Article  Google Scholar 

  9. Holger, S.: 2020 insider threat report https://www.securonix.com/resources/2020-insider-threat-report/

  10. Kim, D.W., Hong, S.S., Han, M.M.: A study on classification of insider threat using Markov chain model. KSII Trans. Internet Inf. Syst. 12(4), 1887–1898 (2018)

    Google Scholar 

  11. Jang, M., Ryu, Y., Kim, J.S., Cho, M.: Against insider threats with hybrid anomaly detection with local-feature autoencoder and global statistics (LAGS). IEICE Trans. Inf. Syst. E103D(4), 888–891 (2020)

    Article  Google Scholar 

  12. Bauder, R.A., Khoshgoftaar, T.M.: A study on rare fraud predictions with big Medicare claims fraud data. Intell. Data Anal. 24(1), 141–161 (2020)

    Article  Google Scholar 

  13. Wang, Z.C., Sun, Y.R.: Optimization of SMOTE for imbalanced data based on AdaRBFNN and hybrid metaheuristics. Intell. Data Anal. 25(3), 541–554 (2021)

    Article  Google Scholar 

  14. Dlamini, G., Fahim, M.: DGM: a data generative model to improve minority class presence in anomaly detection domain. Neural Comput. Appl. 33(20), 13635–13646 (2021)

    Article  Google Scholar 

  15. Kim, J., Park, M., Kim, H., Cho, S., Kang, P.: Insider threat detection based on user behavior modeling and anomaly detection algorithms. Appl. Sci-Basel 9(19), 4018 (2019)

    Article  Google Scholar 

  16. Le, D.C., Zincir-Heywood, N.: Exploring anomalous behaviour detection and classification for insider threat identification. Int. J. Netw. Manag. 31(4), e2109 (2019)

    Article  Google Scholar 

  17. Gamachchi, A., Boztas, S.: Insider threat detection through attributed graph clustering, In: Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, pp. 112-119 (2017)

  18. Zou, S., Sun, H., Xu, G., Quan, R.: Ensemble strategy for insider threat detection from user activity logs. CMC-Comput. Mater. Con. 65(2), 1321–1334 (2020)

    Google Scholar 

  19. Raman, M.R.G., Somu, N., Mathur, A.P.: A multilayer perceptron model for anomaly detection in water treatment plants. Int. J. Crit. Infr. Prot. 31, 100393 (2003)

    Google Scholar 

  20. Rashid, T., Agrafiotis, I., Nurse, J.R.C.: A new take on detecting insider threats: exploring the use of hidden Markov models. CCS International workshop on managing insider security threats, pp. 47-56 (2016)

  21. Lo, O., Buchanan, W.J., Griffiths, P., Macfarlane, R.: Distance measurement methods for improved insider threat detection. Secur. Commun. Netw. UNSP5906368 (2018)

  22. Chen, T., Tang, L.A., Sun, Y.Z., Chen, Z.Z., Zhang, K: Entity embedding-based anomaly detection for heterogeneous categorical events. In: International joint conference on artificial intelligence, pp. 1396-1403 (2016)

  23. Wang, J.R., Cai, L.J., Yu, A.M., Meng, D.: Embedding learning with heterogeneous event sequence for insider threat detection. In: 31st IEEE international conference on tools with artificial intelligence, pp. 947-954 (2019)

  24. Hutchins, E., Cloppert, M., Amin, R.: Intelligence-Driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. In: 6th International conference on information warfare and security, pp. 80-81 (2011)

  25. Kim, H., Kwon, H.J., Kim, K.K.: Modified cyber kill chain for multimedia service environments. Multimed. Tools Appl. 78(3), 3153–3170 (2019)

    Article  Google Scholar 

  26. Ning, C., Xi, Z.: Window-type detector for stealthy false data injection attack in cyber-physical systems. Int. J. Syst. Sci. (2023). https://doi.org/10.1080/00207721.2023.2186754

    Article  MathSciNet  MATH  Google Scholar 

  27. Gayathri, R.G., Sajjanhar, A., Xiang, Y.: Image-based feature representation for insider threat classification. Appl Sci-Basel 10(14), 4945 (2020)

    Article  Google Scholar 

  28. Oh, J., Kim, T.H., Lee, K.H.: Advanced insider threat detection model to apply periodic work atmosphere. KSII Internet Inf. 13, 1722–1737 (2019)

    Google Scholar 

  29. Garchery, M., Granitzer, M.: Identifying and clustering users for unsupervised intrusion detection in corporate audit sessions. In: Identifying and clustering users for unsupervised intrusion detection in corporate audit sessions, pp. 19-27 (2019)

  30. Aldairi, M., Karimi, L., Joshi, J.: A trust aware unsupervised learning approach for insider threat detection. IN: IEEE International conference on information reuse and integration for data science, pp. 89-98 (2019)

  31. Lisboa, P.J.G., Saralajew, S., Vellido, A., Fernández-Domenech, R., Villmann, T.: The coming of age of interpretable and explainable machine learning models. Neurocomputing 535(28), 25–39 (2023)

    Article  Google Scholar 

  32. Lee, D.D., Seung, H.S.: Learning the parts of objects by non-negative matrix factorization. Nature 401, 788–791 (1999)

    Article  MATH  Google Scholar 

  33. Chen, Y., Ashizawa, N., Yeo, C.K., Yanai, N., Yean, S.: Multi-scale self-organizing map assisted deep autoencoding Gaussian mixture model for unsupervised intrusion detection. Knowl.-Based Syst. 224, 107086 (2021)

    Article  Google Scholar 

  34. Blaise, A., Bouet, M., Conan, V., Secci, S.: Detection of zero-day attacks: An unsupervised port-based approach. Comput. Netw. 180, 107391 (2020)

  35. Taïbi, S., Zeroual, A., Meddi, M.: Efect of autocorrelation on temporal trends in air temperature in Northern Algeria and links with teleconnections patterns. Theor. Appl. Climatol. 147(3), 959–984 (2022)

  36. Caliński, T., Harabasz, J.: A dendrite method for cluster analysis. Commun. Stat-Thero. M. 3, 1–27 (1974)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgements

This work was supported in part by the Scientific and Technological Innovation 2030—Major Project of New Generation Artificial Intelligence (2020AAA0109300), the Bashkir State Medical University Strategic Academic Leadership Program (PRIORITY-2030).

Funding

The authors have not disclosed any funding.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiu Kan.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest concerning the publication of this manuscript.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kan, X., Fan, Y., Zheng, J. et al. User-level malicious behavior analysis model based on the NMF-GMM algorithm and ensemble strategy. Nonlinear Dyn 111, 21391–21408 (2023). https://doi.org/10.1007/s11071-023-08954-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11071-023-08954-1

Keywords

Navigation