Skip to main content

Addressing Insider Threat through Cost-Sensitive Document Classification

  • Chapter
Terrorism Informatics

Part of the book series: Integrated Series In Information Systems ((ISIS,volume 18))

  • 1958 Accesses

Most organizations use computerized security systems to manage and protect their confidential information. While security is mostly concerned with prevention of attacks from outsiders, security breaches by insiders have recently gained increasing attention from the security community. In this chapter, we describe a cost-sensitive document classification scheme which forms the basis for determining the legitimacy of confidential access by insiders. Our scheme enforces compliance with the “need to know” security principle, namely that the requests for access are authorized only if the content of the requested information is relevant to the requester’s current information analysis project. First, we formulate such content-based authorization, i.e., whether to accept or reject access requests as a binary classification problem. Second, we implement this problem in a costsensitive learning framework in which the cost caused by incorrect decision is different according to the relative importance of the error types; false positive and false negative. In particular, the cost for a false positive (i.e., accepting a security violating request) is considered more expensive than that of false negative (i.e., rejecting a valid request). The former is a serious security problem because confidential information, which should not be revealed, can be accessed. We experimentally compared various costsensitive classifiers with conventional error-minimizing classifiers. Our results indicate that costing using logistic regression showed the best performance, in terms of the smallest cost paid, the lowest false positive rate, and the relatively low false negative rate.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Aleman-Meza, B., Burns, P., Eavenson, M., Palaniswami, D., and Sheth, A., An ontological approach to the document access problem of insiders threat, In Proceedings of IEEE International Conference on Intelligence and Security Informatics (ISI-05), pp. 486-491, 2005.

    Google Scholar 

  • Ankolekar, A., Seo, Y.-W., and Sycara, K. Investigating semantic knowledge for text learning, In Proceedings of SIGIR-2003 Workshop on Semantic Web, pp. 9-17, 2003.

    Google Scholar 

  • Domingos, P., Metacost: A general method for making classifiers cost-sensitive, In Proceedings of International Conference on Knowledge Discovery and Data Mininig, pp. 154-164, 1999.

    Google Scholar 

  • Drummond, C. and Holte, R.C., Exploiting the cost (in)sensitivity of decision tree splitting criteria, In Proceedings of International Conference on Machine Learning (ICML-00), pp. 239-246, 2000.

    Google Scholar 

  • Duda, R.O., Hart, P.E., Stork, D.G., Pattern Classification, Wiley-Interscience, 2001.

    Google Scholar 

  • Elkan, C., The foundations of cost-sensitive learning, In Proceedings of International Joint Conference on Artificial Intelligence (IJCAI-01), pp. 973-978, 2001

    Google Scholar 

  • Fan, W., Stolfo, S.J., Zhang, J., and Chan, P.K., Adacost: Misclassification cost-sensitive boosting, In Proceedings of International Conference on Machine Learning (ICML-99), pp. 97-105, 1999.

    Google Scholar 

  • Fawcett, T., ROC graphs: Notes and practical considerations for researchers, HP Lab Palo Alto, HPL-2003-4, 2003.

    Google Scholar 

  • Giuri, L. and Iglio, P., Role templates for content-based access control, In Proceedings of ACM Workshop on Role Based Access Control, pp. 153-159, 1997.

    Google Scholar 

  • Lee, W., Miller, M., Stolfo, S., Jallad, K., Park, C., Zadok, E., and Prabhakar, V., Toward cost-sensitive modeling for intrusion detection, ACM Journal of Computer Society, Vol. 10, No. 1-2, pp. 5-22, 2002.

    Google Scholar 

  • Joachims, T., Text categorization with support vector machines: Learning with many relevant features, In Proceedings of European Conference on Machine Learning (ECML-98), 1998.

    Google Scholar 

  • Ng, A.Y. and Jordan, M.I., On discriminative vs. generative classifiers: A comparison of logistic regression and naïve Bayes, In Proceedings of Neural Information Processing Systems (NIPS-01), pp. 841-848, 2001.

    Google Scholar 

  • Seo, Y.-W., Giampapa, J., and Sycara, K., A multi-agent system for enforcing need-to-know security policies, In Proceedings of International Conference on Autonomous Agents and Multi-Agent Systems (AAMAS) Workshop on Agent Oriented Information Systems (AOIS-04), pp. 163-179, 2004.

    Google Scholar 

  • Seo, Y.-W. and Sycara, K., Cost-sensitive access control for illegitimate confidential access by insiders, In Proceedings of IEEE Intelligence and Security Informatics (ISI-06), pp. 117-128, 2006.

    Google Scholar 

  • Schutze, H., Hull, D.A., Pedersen, J.O., A comparison of classifiers and document representations for the routing problem, In Proceedings of International ACM Conference on Research and Development in Information Retrieval (SIGIR-95), pp 229-237, 1995.

    Google Scholar 

  • Symonenko, S., Liddy, E.D., and Yilmazel, O., Semantic analysis for monitoring insider threats, In Proceedings of Symposium on Intelligence and Security Informatics, 2004.

    Google Scholar 

  • Torkkola, T., Linear discriminant analysis in document classification, In IEEE Workshop on TextMining, 2001.

    Google Scholar 

  • Weippl, E. and Ibrahim, K., Content-based management of document access control, In Proceedings of the 14th International Conference on Applications of Prolog, 2001.

    Google Scholar 

  • Zadrozny, B., Langford, J., and Abe, N., A simple method for cost-sensitive learning, Technical report, IBM Tech Report, 2002.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Seo, YW., Sycara, K. (2008). Addressing Insider Threat through Cost-Sensitive Document Classification. In: Chen, H., Reid, E., Sinai, J., Silke, A., Ganor, B. (eds) Terrorism Informatics. Integrated Series In Information Systems, vol 18. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-71613-8_21

Download citation

Publish with us

Policies and ethics