Ben-ware: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software

نویسندگان

  • A. Stephen McGough
  • Budi Arief
  • Carl Gamble
  • David Wall
  • John Brennan
  • John S. Fitzgerald
  • Aad P. A. van Moorsel
  • Sujeewa Alwis
  • Georgios Theodoropoulos
  • Ed Ruck-Keene
چکیده

The insider threat problem is a significant and ever present issue faced by any organisation. While security mechanisms can be put in place to reduce the chances of external agents gaining access to a system, either to steal assets or alter records, the issue is more complex in tackling insider threat. If an employee already has legitimate access rights to a system, it is much more difficult to prevent them from carrying out inappropriate acts, as it is hard to determine whether the acts are part of their official work or indeed malicious. We present in this paper the concept of “Ben-ware”: a beneficial software system that uses low-level data collection from employees’ computers, along with Artificial Intelligence, to identify anomalous behaviour of an employee. By comparing each employee’s activities against their own ‘normal’ profile, as well as against the organisational’s norm, we can detect those that are significantly divergent, which might indicate malicious activities. Dealing with false positives is one of the main challenges here. Anomalous behaviour could indicate malicious activities (such as an employee trying to steal confidential information), but they could also be benign (for example, an employee is carrying out a workaround or taking a shortcut to complete their job). Therefore it is important to minimise the risk of false positives, and we do this by combining techniques from human factors, artificial intelligence, and risk analysis in our approach. Developed as a distributed system, Ben-ware has a three-tier architecture composed of (i) probes for data collection, (ii) intermediate nodes for data routing, and (iii) high level nodes for data analysis. The distributed nature of Ben-ware allows for near-real-time analysis of employees without the need for dedicated hardware or a significant impact on the existing infrastructure. This will enable Ben-ware to be deployed in situations where there are restrictions due to legacy and low-power resources, or in cases where the network connection may be intermittent or has a low bandwidth. We demonstrate the appropriateness of Ben-ware, both in its ability to detect potentially malicious acts and its lowimpact on the resources of the organisation, through a proof-of-concept system and a scenario based on synthetically generated user data.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

طراحی یک سیستم خبره برای تشخیص و پیشنهاد در مورد شیوه درمان سرطان خون

Introduction: Expert systems are computer programs that have been designed aimed to make available personnel skills, for non-specialists. These programs are trying to model thinking to simulate human performance, and make correlation between performances of individual experts and software. Nowadays various expert systems have been presented in medical sciences. In diagnosis and treatment of blo...

متن کامل

An Approach to the Intelligent Monitoring of Anomalous Human Behaviour Based on the Actor Prolog Object-Oriented Logic Language

A method for the monitoring of anomalous human behaviour that is based on the logical description of complex human behaviour patterns and special kinds of blob (a separated area of a foreground image) motion statistical metrics is developed. The concurrent object-oriented logic language is used for the analysis of graphs of tracks of moving blobs; the graphs are supplied by low-level analysis a...

متن کامل

Designing and Dismounting an Intelligent System of Irrigation Management for Greenhouse based on Delphi Software

The drought continuity and also restricting watery sources caused agriculture section forgetold flooding methods for optimum water exploitation and proceeding new irrigation systems.New generation of irrigation systems called intelligent systems is a new solution leading toexploiting water increase to higher than 80%. In order to measure sensors and to controlprocessors in designing and dismoun...

متن کامل

Exploring Assignment-Adaptive (ASAD) Trading Agents in Financial Market Experiments

Automated trading systems in the global financial markets are increasingly being deployed to do jobs previously done by skilled human traders: very often a human trader in the markets simply cannot tell whether the counter-party to a trade is another human, or a machine. Clearly, automated trading systems can easily be considered as “intelligent” software agents. In this paper we report on expe...

متن کامل

IoT Architectural Framework: Connection and Integration Framework for IoT Systems

The proliferation of the Internet of Things (IoT) has since seen a growing interest in architectural design and adaptive frameworks to promote the connection between heterogeneous IoT devices and IoT systems. The most widely favoured software architecture in IoT is the Service Oriented Architecture (SOA), which aims to provide a loosely coupled systems to leverage the use and reuse of IoT servi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • JoWUA

دوره 6  شماره 

صفحات  -

تاریخ انتشار 2015