Title
An Insider Threat Detection Method Based on Business Process Mining
Abstract
Current intrusion detection systems are mostly for detecting external attacks, but the \"Prism Door\" and other similar events indicate that internal staff may bring greater harm to organizations in information security. Traditional insider threat detection methods only consider the audit records of personal behavior and failed to combine it with business activities, which may miss the insider threat happened during a business process. The authors consider operators' behavior and correctness and performance of the business activities, propose a business process mining based insider threat detection system. The system firstly establishes the normal profiles of business activities and the operators by mining the business log, and then detects specific anomalies by comparing the content of real-time log with the corresponding normal profile in order to find out the insiders and the threats they have brought. The relating anomalies are defined and the corresponding detection algorithms are presented. The authors have performed experimentation using the ProM framework and Java programming, with five synthetic business cases, and found that the system can effectively identify anomalies of both operators and business activities that may be indicative of potential insider threat.
Year
DOI
Venue
2017
10.4018/ijbdcn.2017070107
IJBDCN
Keywords
Field
DocType
Anomaly Detection, Insider Threat, Process Mining
Anomaly detection,Business case,Business process,Computer security,Computer science,Correctness,Information security,Insider threat,Intrusion detection system,Process mining
Journal
Volume
Issue
ISSN
13
2
1548-0631
Citations 
PageRank 
References 
0
0.34
11
Authors
5
Name
Order
Citations
PageRank
Taiming Zhu100.68
Yuanbo Guo288983.95
Ankang Ju300.34
Jun Ma44719.80
Xu An Wang522362.79