Volume 6 - Issue 4
Supervised and Unsupervised methods to detect Insider Threat from Enterprise Social and Online Activity Data
- Gaurang Gavai
Palo Alto Research Center, Palo Alto CA 94304 USA
ggavai@parc.com
- Kumar Sricharan
Palo Alto Research Center, Palo Alto CA 94304 USA
skumar@parc.com
- Dave Gunning
Palo Alto Research Center, Palo Alto CA 94304 USA
dgunning@parc.com
- John Hanley
Palo Alto Research Center, Palo Alto CA 94304 USA
jhanley@parc.com
- Mudita Singhal
Palo Alto Research Center, Palo Alto CA 94304 USA
msinghal@parc.com
- Rob Rolleston
Palo Alto Research Center East, Webster NY 14580 USA
rrolleston@parc.com
Keywords: Anomaly detection, insider threat detection, quitting detection, enterprise social data
Abstract
Insider threat is a significant security risk for organizations, and detection of insider threat is of
paramount concern to organizations. In this paper, we attempt to discover insider threat by analyzing
enterprise social and online activity data of employees. To this end, we process and extract relevant
features that are possibly indicative of insider threat behavior. This includes features extracted from
social data including email communication patterns and content, and online activity data such as web
browsing patterns, email frequency, and file and machine access patterns. Subsequently, we take
two approaches to detect insider threat: (i) an unsupervised approach where we identify statistically
abnormal behavior with respect to these features using state-of-the-art anomaly detection methods,
and (ii) a supervised approach where we use labels indicating when employees quit the company as
a proxy for insider threat activity to design a classifier. We test our approach on a real world data set
with artificially injected insider threat events. We obtain a ROC score of 0.77 for the unsupervised
approach, and a classification accuracy of 73.4% for the supervised approach. These results indicate
that our proposed approaches are fairly successful in identifying insider threat events. Finally, we
build a visualization dashboard that enables managers and HR personnel to quickly identify employees
with high threat risk scores which will enable them to take suitable preventive measures and limit
security risk.