GraphCH: A Deep Framework for Assessing Cyber-Human Aspects in Insider Threat Detection
- New Mexico Institute of Mining and Technology, Socorro, NM (United States); University of Texas at San Anton
- University of Texas at San Antonio, TX (United States)
Insider threat is one of the most damaging cyber attacks that could cause the loss of intellectual property and enterprise data security breaches. Action sequence data such as host logs are used to investigate such threats and develop anomaly-based AI detectors. However, insider threat actions are similar to legitimate user activities, causing AI detectors to fail and suffer from high false alarm rates. Therefore, user cyber activity logs are inadequate to fully unfold insider threats. In this study, we adopt human psychological principles of risk-taking and impulsiveness along with host data to assess the influence and usefulness of human behavioral aspects in insider threat detection. Here, we hypothesize that individuals' impulsive and risk-taking behavior correlates with cyberspace activities. To validate our hypothesis, we conducted an IRB-approved study recruiting 35 participants who work in a large U.S. university and collected their cyber and psychological data for 90 days. Host and human-behavioral data analysis and mapping indicate that impulsive and risk-taking users trigger more system errors causing (un)intentional insider threats and are susceptible to attackers' social engineering and cognitive hacking. Utilizing cyber-human aspects, we introduce a Cyber-Human Graph Neural Network (GNN) based framework GraphCH to identify abnormal user behaviors and detect insider threats.
- Research Organization:
- University of Texas at San Antonio, TX (United States)
- Sponsoring Organization:
- USDOE Office of Nuclear Energy (NE); USDOE National Nuclear Security Administration (NNSA)
- Grant/Contract Number:
- NA0003985
- OSTI ID:
- 2283230
- Alternate ID(s):
- OSTI ID: 2283237
- Journal Information:
- IEEE Transactions on Dependable and Secure Computing, Journal Name: IEEE Transactions on Dependable and Secure Computing Journal Issue: 5 Vol. 21; ISSN 1545-5971
- Publisher:
- IEEECopyright Statement
- Country of Publication:
- United States
- Language:
- English
Similar Records
Analytic framework for the United States cyber deterrence strategy. Final draft, 2nd submission (20 May 2015]