Literature DB >> 24489520

Detecting Anomalous Insiders in Collaborative Information Systems.

You Chen1, Steve Nyemba1, Bradley Malin1.   

Abstract

Collaborative information systems (CISs) are deployed within a diverse array of environments that manage sensitive information. Current security mechanisms detect insider threats, but they are ill-suited to monitor systems in which users function in dynamic teams. In this paper, we introduce the community anomaly detection system (CADS), an unsupervised learning framework to detect insider threats based on the access logs of collaborative environments. The framework is based on the observation that typical CIS users tend to form community structures based on the subjects accessed (e.g., patients' records viewed by healthcare providers). CADS consists of two components: 1) relational pattern extraction, which derives community structures and 2) anomaly prediction, which leverages a statistical model to determine when users have sufficiently deviated from communities. We further extend CADS into MetaCADS to account for the semantics of subjects (e.g., patients' diagnoses). To empirically evaluate the framework, we perform an assessment with three months of access logs from a real electronic health record (EHR) system in a large medical center. The results illustrate our models exhibit significant performance gains over state-of-the-art competitors. When the number of illicit users is low, MetaCADS is the best model, but as the number grows, commonly accessed semantics lead to hiding in a crowd, such that CADS is more prudent.

Entities:  

Keywords:  Privacy; data mining; insider threat detection; social network analysis

Year:  2012        PMID: 24489520      PMCID: PMC3905623          DOI: 10.1109/TDSC.2012.11

Source DB:  PubMed          Journal:  IEEE Trans Dependable Secure Comput        ISSN: 1545-5971            Impact factor:   7.329


  11 in total

1.  Learning relational policies from electronic health record access logs.

Authors:  Bradley Malin; Steve Nyemba; John Paulett
Journal:  J Biomed Inform       Date:  2011-01-26       Impact factor: 6.317

2.  Properties of highly clustered networks.

Authors:  M E J Newman
Journal:  Phys Rev E Stat Nonlin Soft Matter Phys       Date:  2003-08-21

3.  Role prediction using Electronic Medical Record system audits.

Authors:  Wen Zhang; Carl A Gunter; David Liebovitz; Jian Tian; Bradley Malin
Journal:  AMIA Annu Symp Proc       Date:  2011-10-22

Review 4.  Reviewing the benefits and costs of electronic health records and associated patient safety technologies.

Authors:  Nir Menachemi; Robert G Brooks
Journal:  J Med Syst       Date:  2006-06       Impact factor: 4.460

5.  Leveraging Social Networks to Detect Anomalous Insider Actions in Collaborative Environments.

Authors:  You Chen; Steve Nyemba; Wen Zhang; Bradley Malin
Journal:  ISI       Date:  2011-07

6.  Experience-Based Access Management: A Life-Cycle Framework for Identity and Access Management Systems.

Authors:  Carl A Gunter; David Liebovitz; Bradley Malin
Journal:  IEEE Secur Priv       Date:  2011       Impact factor: 3.573

7.  Anomaly and signature filtering improve classifier performance for detection of suspicious access to EHRs.

Authors:  Jihoon Kim; Janice M Grillo; Aziz A Boxwala; Xiaoqian Jiang; Rose B Mandelbaum; Bhakti A Patel; Debra Mikels; Staal A Vinterbo; Lucila Ohno-Machado
Journal:  AMIA Annu Symp Proc       Date:  2011-10-22

8.  Supporting communication in an integrated patient record system.

Authors:  Dario A Giuse
Journal:  AMIA Annu Symp Proc       Date:  2003

9.  Situation-Based Access Control: privacy management via modeling of patient data access scenarios.

Authors:  Mor Peleg; Dizza Beimel; Dov Dori; Yaron Denekamp
Journal:  J Biomed Inform       Date:  2008-04-10       Impact factor: 6.317

10.  Using statistical and machine learning to help institutions detect suspicious access to electronic health records.

Authors:  Aziz A Boxwala; Jihoon Kim; Janice M Grillo; Lucila Ohno-Machado
Journal:  J Am Med Inform Assoc       Date:  2011 Jul-Aug       Impact factor: 4.497

View more
  10 in total

1.  Building bridges across electronic health record systems through inferred phenotypic topics.

Authors:  You Chen; Joydeep Ghosh; Cosmin Adrian Bejan; Carl A Gunter; Siddharth Gupta; Abel Kho; David Liebovitz; Jimeng Sun; Joshua Denny; Bradley Malin
Journal:  J Biomed Inform       Date:  2015-04-01       Impact factor: 6.317

Review 2.  Clinical Data Reuse or Secondary Use: Current Status and Potential Future Progress.

Authors:  S M Meystre; C Lovis; T Bürkle; G Tognola; A Budrionis; C U Lehmann
Journal:  Yearb Med Inform       Date:  2017-09-11

3.  Auditing medical records accesses via healthcare interaction networks.

Authors:  You Chen; Steve Nyemba; Bradley Malin
Journal:  AMIA Annu Symp Proc       Date:  2012-11-03

4.  We work with them? Healthcare workers interpretation of organizational relations mined from electronic health records.

Authors:  You Chen; Nancy Lorenzi; Steve Nyemba; Jonathan S Schildcrout; Bradley Malin
Journal:  Int J Med Inform       Date:  2014-04-28       Impact factor: 4.046

5.  Using electronic health record audit logs to study clinical activity: a systematic review of aims, measures, and methods.

Authors:  Adam Rule; Michael F Chiang; Michelle R Hribar
Journal:  J Am Med Inform Assoc       Date:  2020-03-01       Impact factor: 4.497

6.  Work-Based Access Control Model for Cooperative Healthcare Environments: Formal Specification and Verification.

Authors:  Mohamed Abomhara; Huihui Yang; Geir M Køien; Mehdi Ben Lazreg
Journal:  J Healthc Inform Res       Date:  2017-05-22

7.  Identifying collaborative care teams through electronic medical record utilization patterns.

Authors:  You Chen; Nancy M Lorenzi; Warren S Sandberg; Kelly Wolgast; Bradley A Malin
Journal:  J Am Med Inform Assoc       Date:  2017-04-01       Impact factor: 4.497

8.  Predicting Length of Stay for Obstetric Patients via Electronic Medical Records.

Authors:  Cheng Gao; Abel N Kho; Catherine Ivory; Sarah Osmundson; Bradley A Malin; You Chen
Journal:  Stud Health Technol Inform       Date:  2017

9.  Techniques and countermeasures for preventing insider threats.

Authors:  Rakan A Alsowail; Taher Al-Shehari
Journal:  PeerJ Comput Sci       Date:  2022-04-01

Review 10.  Artificial Intelligence-Based Framework for Analyzing Health Care Staff Security Practice: Mapping Review and Simulation Study.

Authors:  Prosper Kandabongee Yeng; Livinus Obiora Nweke; Bian Yang; Muhammad Ali Fauzi; Einar Arthur Snekkenes
Journal:  JMIR Med Inform       Date:  2021-12-22
  10 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.