Paper
7 May 2012 Insider threat detection enabled by converting user applications into fractal fingerprints and autonomously detecting anomalies
Holger M. Jaenisch, James Handley
Author Affiliations +
Abstract
We demonstrate insider threat detection for determining when the behavior of a computer user is suspicious or different from his or her normal behavior. This is accomplished by combining features extracted from text, emails, and blogs that are associated with the user. These sources can be characterized using QUEST, DANCER, and MenTat to extract features; however, some of these features are still in text form. We show how to convert these features into numerical form and characterize them using parametric and non-parametric statistics. These features are then used as input into a Random Forest classifier that is trained to recognize whenever the user's behavior is suspicious or different from normal (off-nominal). Active authentication (user identification) is also demonstrated using the features and classifiers derived in this work. We also introduce a novel concept for remotely monitoring user behavior indicator patterns displayed as an infrared overlay on the computer monitor, which the user is unaware of, but a narrow pass-band filtered webcam can clearly distinguish. The results of our analysis are presented.
© (2012) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Holger M. Jaenisch and James Handley "Insider threat detection enabled by converting user applications into fractal fingerprints and autonomously detecting anomalies", Proc. SPIE 8408, Cyber Sensing 2012, 840802 (7 May 2012); https://doi.org/10.1117/12.914849
Lens.org Logo
CITATIONS
Cited by 3 patents.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Data modeling

Fractal analysis

Defense and security

Optical character recognition

Sensors

Binary data

Computer programming

Back to Top