Literature DB >> 25485309

Detection of Anomalous Insiders in Collaborative Environments via Relational Analysis of Access Logs.

You Chen1, Bradley Malin2.   

Abstract

Collaborative information systems (CIS) are deployed within a diverse array of environments, ranging from the Internet to intelligence agencies to healthcare. It is increasingly the case that such systems are applied to manage sensitive information, making them targets for malicious insiders. While sophisticated security mechanisms have been developed to detect insider threats in various file systems, they are neither designed to model nor to monitor collaborative environments in which users function in dynamic teams with complex behavior. In this paper, we introduce a community-based anomaly detection system (CADS), an unsupervised learning framework to detect insider threats based on information recorded in the access logs of collaborative environments. CADS is based on the observation that typical users tend to form community structures, such that users with low a nity to such communities are indicative of anomalous and potentially illicit behavior. The model consists of two primary components: relational pattern extraction and anomaly detection. For relational pattern extraction, CADS infers community structures from CIS access logs, and subsequently derives communities, which serve as the CADS pattern core. CADS then uses a formal statistical model to measure the deviation of users from the inferred communities to predict which users are anomalies. To empirically evaluate the threat detection model, we perform an analysis with six months of access logs from a real electronic health record system in a large medical center, as well as a publicly-available dataset for replication purposes. The results illustrate that CADS can distinguish simulated anomalous users in the context of real user behavior with a high degree of certainty and with significant performance gains in comparison to several competing anomaly detection models.

Entities:  

Keywords:  Data Mining; Insider Threat Detection; Privacy; Social Network Analysis

Year:  2011        PMID: 25485309      PMCID: PMC4257138          DOI: 10.1145/1943513.1943524

Source DB:  PubMed          Journal:  CODASPY


  4 in total

Review 1.  Reviewing the benefits and costs of electronic health records and associated patient safety technologies.

Authors:  Nir Menachemi; Robert G Brooks
Journal:  J Med Syst       Date:  2006-06       Impact factor: 4.460

2.  A longitudinal social network analysis of the editorial boards of medical informatics and bioinformatics journals.

Authors:  Bradley Malin; Kathleen Carley
Journal:  J Am Med Inform Assoc       Date:  2007-02-28       Impact factor: 4.497

3.  Collaborative management of chronic illness.

Authors:  M Von Korff; J Gruman; J Schaefer; S J Curry; E H Wagner
Journal:  Ann Intern Med       Date:  1997-12-15       Impact factor: 25.391

4.  Supporting communication in an integrated patient record system.

Authors:  Dario A Giuse
Journal:  AMIA Annu Symp Proc       Date:  2003
  4 in total
  12 in total

1.  Detecting Inappropriate Access to Electronic Health Records Using Collaborative Filtering.

Authors:  Aditya Krishna Menon; Xiaoqian Jiang; Jihoon Kim; Jaideep Vaidya; Lucila Ohno-Machado
Journal:  Mach Learn       Date:  2014-04-01       Impact factor: 2.940

2.  Auditing medical records accesses via healthcare interaction networks.

Authors:  You Chen; Steve Nyemba; Bradley Malin
Journal:  AMIA Annu Symp Proc       Date:  2012-11-03

3.  We work with them? Healthcare workers interpretation of organizational relations mined from electronic health records.

Authors:  You Chen; Nancy Lorenzi; Steve Nyemba; Jonathan S Schildcrout; Bradley Malin
Journal:  Int J Med Inform       Date:  2014-04-28       Impact factor: 4.046

4.  Leveraging Social Networks to Detect Anomalous Insider Actions in Collaborative Environments.

Authors:  You Chen; Steve Nyemba; Wen Zhang; Bradley Malin
Journal:  ISI       Date:  2011-07

5.  Experience-Based Access Management: A Life-Cycle Framework for Identity and Access Management Systems.

Authors:  Carl A Gunter; David Liebovitz; Bradley Malin
Journal:  IEEE Secur Priv       Date:  2011       Impact factor: 3.573

6.  Using electronic health record audit logs to study clinical activity: a systematic review of aims, measures, and methods.

Authors:  Adam Rule; Michael F Chiang; Michelle R Hribar
Journal:  J Am Med Inform Assoc       Date:  2020-03-01       Impact factor: 4.497

7.  Context-Aware Anomaly Detection for Electronic Medical Record Systems.

Authors:  Xiaowei Li; Yuan Xue; You Chen; Bradley Malin
Journal:  Healthsec       Date:  2011

8.  Detecting Anomalous Insiders in Collaborative Information Systems.

Authors:  You Chen; Steve Nyemba; Bradley Malin
Journal:  IEEE Trans Dependable Secure Comput       Date:  2012-05       Impact factor: 7.329

9.  Specializing network analysis to detect anomalous insider actions.

Authors:  You Chen; Steve Nyemba; Wen Zhang; Bradley Malin
Journal:  Secur Inform       Date:  2012-02-27

10.  Explaining accesses to electronic medical records using diagnosis information.

Authors:  Daniel Fabbri; Kristen Lefevre
Journal:  J Am Med Inform Assoc       Date:  2012-11-02       Impact factor: 4.497

View more

北京卡尤迪生物科技股份有限公司 © 2022-2023.