SlideShare a Scribd company logo
Visualizing the Insider Threat:
Challenges and tools for identifying
malicious user activity
Philip A. Legg
University of the West of England, UK
phil.legg@uwe.ac.uk
Introduction
• What is Insider Threat?
• Identifying Insider Threats
• Visual Analytics for Insider Threat
• Challenges and Limitations
• Conclusion
Insider Threat
• Someone with privileged access and knowledge of an
organisation, who uses this in such a way that is detrimental to the
operation of the organisation.
• E.g., Employees, management, stakeholders, contractors
• Examples threats could include intellectual property theft, data
fraud, system sabotage, and reputational damage.
• Typically, a threat would be initiated by a trigger and a motive
(e.g., personal financial difficulties result in theft).
Insider Threat
• According to the 2015 Insider Threat report by Vormetric:
“93% of U.S. organisations polled responded as being vulnerable to
insider threats”.
“59% of U.S. respondents stated that privileged users pose the
biggest threat to their organisation”
• How can we mitigate threats without impacting productivity?
• Have advances in technology created more opportunity for attack?
• Does more activity data equal more success for mitigating threats?
Identifying Insider Threat
• Given observations of user activity,
how can we identify insider threats?
• Generate user and role profiles
for comparative analysis.
• For each user/role:
• What devices do they use?
• What activities do they perform?
• What are the attributes of the
activity?
• What is the time-profile of each
instance?
Identifying Insider Threat
GroupActivity Type
_hourly_usage_
_new_activity_for_device_
_new_attribute_for_device_
_for_role
_for_user
logon
usb_insert
email
http
file
• Given a profile of user activity,
how can we identify insider
threats?
• Obtain ‘features’ that
characterize potential threats.
• New activities, or attributes
• Time of the activity/attribute
• Frequency of the activity/attribute
Examples:
logon_new_activity_for_device_for_role
A count of how many times that day the user has logged on to a
device that has not been accessed before by members of
that particular job role.
http_hourly_usage_for_user
A 24 element count for each hour of activity that involves http usage
for this particular user
Identifying Insider Threat
• Given daily ‘features’ for each user, how can we assess and score
user deviation?
• One approach – PCA feature decomposition.
• Suppose then that a security analyst just receives a threat score for
each user for each day…
• How do they know how the threat score is computed?
• How can they trust that this threat score is valid?
• What if they want to understand how the threat score may vary,
based on different activity?
• There is a need for Visual Analytics to examine the detection process!
Overview
Zoom and Filter
Overview
Zoom and Filter
Details on Demand
Overview
• Charts provide an interactive overview
of selected summary statistics (e.g.,
amount of activity, deviation of activity).
• Support filtering (date range, selection).
• Zoomed view of activity by date.
• Contextual view of activity by date.
• Activity bar chart by job role.
• Activity bar chart by individual.
Change stat
Select users
Filter and Zoom
• Interactive PCA [Jeong et al.]
• Scatter plot view of user daily
activity based on PCA.
• Parallel co-ordinates shows
linked view between plot and
profile features.
• Can identify groups of outliers,
and what features contribute
towards the groupings.
Filter and Zoom
• Dragging points on scatter plot
performs inverse PCA.
• Analyst can examine
relationship between the
projection space and the
original feature space.
• Can be used to identify the
contribution or ‘usefulness’ of
each feature for refinement of
detection model (e.g., apply
weighting function to PCA).
Detail View
• Activity plot that maps user
and role activity to time
(supports either polar or
Cartesian grid layout).
• Comparison of user activity
on a daily basis, and against
others in the same job role.
• Could potentially be used in
conjunction with other data if
available (e.g., HR records,
performance reviews).
Blue activity shows USB drive insert and removal
Late night usage + new observation for this role = threat!
Challenges and Limitations
• Gathering activity log data for Insider Threat research
• Synthetic data versus real-world data?
• How well can synthetic data represent normal and malicious activity?
• How can real organisations actually share knowledge of insider cases?
• Anomalous activity != Malicious activity
• Should we be considering hybrid anomaly-signature techniques?
• Make use of both the computational power and the human analyst.
• Insider Threat Prevention
• Ideally, organisations would like to prevent attacks rather than detect.
• Requires understanding behavioral pre-cursors of the attack.
• How can we collect and analyze data that may inform this approach?
Conclusion
• We demonstrate the use of a Visual Analytics tool for the purpose
of Insider Threat detection and model exploration.
• We couple this with a detection routine based on activity profiling
and feature decomposition.
• Future work is to validate approaches for Insider Threat detection
based on real-world deployment
• Just how normal are normal users really behaving, and
likewise, how malicious are the malicious users?
Thank you for your attention
Philip A. Legg
University of the West of England, UK
phil.legg@uwe.ac.uk
Ad

More Related Content

What's hot (20)

Whitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-badWhitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-bad
banerjeea
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016
Karl Kispert
 
Insider threat
Insider threatInsider threat
Insider threat
ARCON TECHSOLUTIONS
 
Insider threats and countermeasures
Insider threats and countermeasuresInsider threats and countermeasures
Insider threats and countermeasures
KAMRAN KHALID
 
Insider Threat Solution from GTRI
Insider Threat Solution from GTRIInsider Threat Solution from GTRI
Insider Threat Solution from GTRI
Zivaro Inc
 
Report on Human factor in the financial industry
Report on Human factor in the financial industryReport on Human factor in the financial industry
Report on Human factor in the financial industry
Chandrak Trivedi
 
Cyber Threat Management
Cyber Threat Management Cyber Threat Management
Cyber Threat Management
Rishi Kant
 
Penetration Testing, Auditing & Standards Issue : 02_2012-1
Penetration Testing, Auditing & Standards Issue : 02_2012-1Penetration Testing, Auditing & Standards Issue : 02_2012-1
Penetration Testing, Auditing & Standards Issue : 02_2012-1
Falgun Rathod
 
Expert FSO Insider Threat Awareness
Expert FSO Insider Threat AwarenessExpert FSO Insider Threat Awareness
Expert FSO Insider Threat Awareness
Eric Schiowitz
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
amrutharam
 
Ethical hacking1
Ethical hacking1Ethical hacking1
Ethical hacking1
Faheen Ahmed
 
Detecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-ThreatDetecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-Threat
Mike Saunders
 
Insider Threat
Insider ThreatInsider Threat
Insider Threat
Andy Thompson
 
5 Signs you have an Insider Threat
5 Signs you have an Insider Threat5 Signs you have an Insider Threat
5 Signs you have an Insider Threat
Lancope, Inc.
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Christopher Daza
 
Insider threat v3
Insider threat v3Insider threat v3
Insider threat v3
Lancope, Inc.
 
Unintentional Insider Threat featuring Dr. Eric Cole
Unintentional Insider Threat featuring Dr. Eric ColeUnintentional Insider Threat featuring Dr. Eric Cole
Unintentional Insider Threat featuring Dr. Eric Cole
David Mai, MBA
 
IRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot SystemIRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot System
IRJET Journal
 
Internal Threats: The New Sources of Attack
Internal Threats: The New Sources of AttackInternal Threats: The New Sources of Attack
Internal Threats: The New Sources of Attack
Mekhi Da ‘Quay Daniels
 
HCA 530, Week 2, Advanced persistent threat healthcare under attack
HCA 530, Week 2, Advanced persistent threat healthcare under attackHCA 530, Week 2, Advanced persistent threat healthcare under attack
HCA 530, Week 2, Advanced persistent threat healthcare under attack
Matthew J McMahon
 
Whitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-badWhitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-bad
banerjeea
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016
Karl Kispert
 
Insider threats and countermeasures
Insider threats and countermeasuresInsider threats and countermeasures
Insider threats and countermeasures
KAMRAN KHALID
 
Insider Threat Solution from GTRI
Insider Threat Solution from GTRIInsider Threat Solution from GTRI
Insider Threat Solution from GTRI
Zivaro Inc
 
Report on Human factor in the financial industry
Report on Human factor in the financial industryReport on Human factor in the financial industry
Report on Human factor in the financial industry
Chandrak Trivedi
 
Cyber Threat Management
Cyber Threat Management Cyber Threat Management
Cyber Threat Management
Rishi Kant
 
Penetration Testing, Auditing & Standards Issue : 02_2012-1
Penetration Testing, Auditing & Standards Issue : 02_2012-1Penetration Testing, Auditing & Standards Issue : 02_2012-1
Penetration Testing, Auditing & Standards Issue : 02_2012-1
Falgun Rathod
 
Expert FSO Insider Threat Awareness
Expert FSO Insider Threat AwarenessExpert FSO Insider Threat Awareness
Expert FSO Insider Threat Awareness
Eric Schiowitz
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
amrutharam
 
Detecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-ThreatDetecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-Threat
Mike Saunders
 
5 Signs you have an Insider Threat
5 Signs you have an Insider Threat5 Signs you have an Insider Threat
5 Signs you have an Insider Threat
Lancope, Inc.
 
Unintentional Insider Threat featuring Dr. Eric Cole
Unintentional Insider Threat featuring Dr. Eric ColeUnintentional Insider Threat featuring Dr. Eric Cole
Unintentional Insider Threat featuring Dr. Eric Cole
David Mai, MBA
 
IRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot SystemIRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot System
IRJET Journal
 
Internal Threats: The New Sources of Attack
Internal Threats: The New Sources of AttackInternal Threats: The New Sources of Attack
Internal Threats: The New Sources of Attack
Mekhi Da ‘Quay Daniels
 
HCA 530, Week 2, Advanced persistent threat healthcare under attack
HCA 530, Week 2, Advanced persistent threat healthcare under attackHCA 530, Week 2, Advanced persistent threat healthcare under attack
HCA 530, Week 2, Advanced persistent threat healthcare under attack
Matthew J McMahon
 

Viewers also liked (20)

Insider threat kill chain
Insider threat   kill chainInsider threat   kill chain
Insider threat kill chain
Tarun Gupta,CRISC CISSP CISM CISA BCCE
 
Insider Threat Kill Chain: Detecting Human Indicators of Compromise
Insider Threat Kill Chain: Detecting Human Indicators of CompromiseInsider Threat Kill Chain: Detecting Human Indicators of Compromise
Insider Threat Kill Chain: Detecting Human Indicators of Compromise
Tripwire
 
Insider Threat Mitigation
 Insider Threat Mitigation Insider Threat Mitigation
Insider Threat Mitigation
Roger Johnston
 
Risk based identity and access management
Risk based identity and access managementRisk based identity and access management
Risk based identity and access management
nadischka66
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - Deloitte
Splunk
 
.conf2011: Web Analytics Throwdown: with NPR and Intuit
.conf2011: Web Analytics Throwdown: with NPR and Intuit.conf2011: Web Analytics Throwdown: with NPR and Intuit
.conf2011: Web Analytics Throwdown: with NPR and Intuit
Erin Sweeney
 
Splunk Fundamentals: Investigations with Core Splunk - Splunk Tech Day
Splunk Fundamentals: Investigations with Core Splunk - Splunk Tech DaySplunk Fundamentals: Investigations with Core Splunk - Splunk Tech Day
Splunk Fundamentals: Investigations with Core Splunk - Splunk Tech Day
Zivaro Inc
 
Splunk | Reporting Use Cases
Splunk | Reporting Use CasesSplunk | Reporting Use Cases
Splunk | Reporting Use Cases
Beth Goldman
 
Splunk conf2014 - Detecting Fraud and Suspicious Events Using Risk Scoring
Splunk conf2014 - Detecting Fraud and Suspicious Events Using Risk ScoringSplunk conf2014 - Detecting Fraud and Suspicious Events Using Risk Scoring
Splunk conf2014 - Detecting Fraud and Suspicious Events Using Risk Scoring
Splunk
 
Splunk .conf2011: Real Time Alerting and Monitoring
Splunk .conf2011: Real Time Alerting and MonitoringSplunk .conf2011: Real Time Alerting and Monitoring
Splunk .conf2011: Real Time Alerting and Monitoring
Erin Sweeney
 
Operational Security
Operational SecurityOperational Security
Operational Security
Splunk
 
SplunkLive! Splunk for Insider Threats and Fraud Detection
SplunkLive! Splunk for Insider Threats and Fraud DetectionSplunkLive! Splunk for Insider Threats and Fraud Detection
SplunkLive! Splunk for Insider Threats and Fraud Detection
Splunk
 
SEAMS-2016, 16-17 May, 2016, Austin, Texas, United States
SEAMS-2016, 16-17 May, 2016, Austin, Texas, United StatesSEAMS-2016, 16-17 May, 2016, Austin, Texas, United States
SEAMS-2016, 16-17 May, 2016, Austin, Texas, United States
Charith Perera
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
Tripwire
 
Rapidly Improving Security Posture - CanDeal
Rapidly Improving Security Posture - CanDealRapidly Improving Security Posture - CanDeal
Rapidly Improving Security Posture - CanDeal
Splunk
 
Proactive Measures to Defeat Insider Threat
Proactive Measures to Defeat Insider ThreatProactive Measures to Defeat Insider Threat
Proactive Measures to Defeat Insider Threat
Andrew Case
 
Splunk Advanced searching and reporting Class description
Splunk Advanced searching and reporting Class descriptionSplunk Advanced searching and reporting Class description
Splunk Advanced searching and reporting Class description
Greg Hanchin
 
Molina Healthcare Customer Presentation
Molina Healthcare Customer PresentationMolina Healthcare Customer Presentation
Molina Healthcare Customer Presentation
Splunk
 
Insider Threat – The Visual Conviction - FIRST 2007 - Sevilla
Insider Threat – The Visual Conviction - FIRST 2007 - SevillaInsider Threat – The Visual Conviction - FIRST 2007 - Sevilla
Insider Threat – The Visual Conviction - FIRST 2007 - Sevilla
Raffael Marty
 
Insider Threat Experiences
Insider Threat ExperiencesInsider Threat Experiences
Insider Threat Experiences
Napier University
 
Insider Threat Kill Chain: Detecting Human Indicators of Compromise
Insider Threat Kill Chain: Detecting Human Indicators of CompromiseInsider Threat Kill Chain: Detecting Human Indicators of Compromise
Insider Threat Kill Chain: Detecting Human Indicators of Compromise
Tripwire
 
Insider Threat Mitigation
 Insider Threat Mitigation Insider Threat Mitigation
Insider Threat Mitigation
Roger Johnston
 
Risk based identity and access management
Risk based identity and access managementRisk based identity and access management
Risk based identity and access management
nadischka66
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - Deloitte
Splunk
 
.conf2011: Web Analytics Throwdown: with NPR and Intuit
.conf2011: Web Analytics Throwdown: with NPR and Intuit.conf2011: Web Analytics Throwdown: with NPR and Intuit
.conf2011: Web Analytics Throwdown: with NPR and Intuit
Erin Sweeney
 
Splunk Fundamentals: Investigations with Core Splunk - Splunk Tech Day
Splunk Fundamentals: Investigations with Core Splunk - Splunk Tech DaySplunk Fundamentals: Investigations with Core Splunk - Splunk Tech Day
Splunk Fundamentals: Investigations with Core Splunk - Splunk Tech Day
Zivaro Inc
 
Splunk | Reporting Use Cases
Splunk | Reporting Use CasesSplunk | Reporting Use Cases
Splunk | Reporting Use Cases
Beth Goldman
 
Splunk conf2014 - Detecting Fraud and Suspicious Events Using Risk Scoring
Splunk conf2014 - Detecting Fraud and Suspicious Events Using Risk ScoringSplunk conf2014 - Detecting Fraud and Suspicious Events Using Risk Scoring
Splunk conf2014 - Detecting Fraud and Suspicious Events Using Risk Scoring
Splunk
 
Splunk .conf2011: Real Time Alerting and Monitoring
Splunk .conf2011: Real Time Alerting and MonitoringSplunk .conf2011: Real Time Alerting and Monitoring
Splunk .conf2011: Real Time Alerting and Monitoring
Erin Sweeney
 
Operational Security
Operational SecurityOperational Security
Operational Security
Splunk
 
SplunkLive! Splunk for Insider Threats and Fraud Detection
SplunkLive! Splunk for Insider Threats and Fraud DetectionSplunkLive! Splunk for Insider Threats and Fraud Detection
SplunkLive! Splunk for Insider Threats and Fraud Detection
Splunk
 
SEAMS-2016, 16-17 May, 2016, Austin, Texas, United States
SEAMS-2016, 16-17 May, 2016, Austin, Texas, United StatesSEAMS-2016, 16-17 May, 2016, Austin, Texas, United States
SEAMS-2016, 16-17 May, 2016, Austin, Texas, United States
Charith Perera
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
Tripwire
 
Rapidly Improving Security Posture - CanDeal
Rapidly Improving Security Posture - CanDealRapidly Improving Security Posture - CanDeal
Rapidly Improving Security Posture - CanDeal
Splunk
 
Proactive Measures to Defeat Insider Threat
Proactive Measures to Defeat Insider ThreatProactive Measures to Defeat Insider Threat
Proactive Measures to Defeat Insider Threat
Andrew Case
 
Splunk Advanced searching and reporting Class description
Splunk Advanced searching and reporting Class descriptionSplunk Advanced searching and reporting Class description
Splunk Advanced searching and reporting Class description
Greg Hanchin
 
Molina Healthcare Customer Presentation
Molina Healthcare Customer PresentationMolina Healthcare Customer Presentation
Molina Healthcare Customer Presentation
Splunk
 
Insider Threat – The Visual Conviction - FIRST 2007 - Sevilla
Insider Threat – The Visual Conviction - FIRST 2007 - SevillaInsider Threat – The Visual Conviction - FIRST 2007 - Sevilla
Insider Threat – The Visual Conviction - FIRST 2007 - Sevilla
Raffael Marty
 
Ad

Similar to Visualizing the Insider Threat: Challenges and tools for identifying malicious user activity (20)

How To Turbo-Charge Incident Response With Threat Intelligence
How To Turbo-Charge Incident Response With Threat IntelligenceHow To Turbo-Charge Incident Response With Threat Intelligence
How To Turbo-Charge Incident Response With Threat Intelligence
Resilient Systems
 
Vulenerability Management.pptx
Vulenerability Management.pptxVulenerability Management.pptx
Vulenerability Management.pptx
ThavaselviMunusamy1
 
RISK MITIGATION AND THREAT IDENTIFICATIONIntroductionInforma.docx
RISK MITIGATION AND THREAT IDENTIFICATIONIntroductionInforma.docxRISK MITIGATION AND THREAT IDENTIFICATIONIntroductionInforma.docx
RISK MITIGATION AND THREAT IDENTIFICATIONIntroductionInforma.docx
joellemurphey
 
How To Turbo-Charge Incident Response With Threat Intelligence
How To Turbo-Charge Incident Response With Threat IntelligenceHow To Turbo-Charge Incident Response With Threat Intelligence
How To Turbo-Charge Incident Response With Threat Intelligence
Resilient Systems
 
ZoneFox, Machine Learning, the Insider Threat and how UEBA protects the user ...
ZoneFox, Machine Learning, the Insider Threat and how UEBA protects the user ...ZoneFox, Machine Learning, the Insider Threat and how UEBA protects the user ...
ZoneFox, Machine Learning, the Insider Threat and how UEBA protects the user ...
ZoneFox
 
How Data Analytics is Re-defining Modern Era in Cyber Security
How Data Analytics is Re-defining Modern Era in Cyber SecurityHow Data Analytics is Re-defining Modern Era in Cyber Security
How Data Analytics is Re-defining Modern Era in Cyber Security
Saqib Chaudhry
 
TakeDownCon Rocket City: Research Advancements Towards Protecting Critical As...
TakeDownCon Rocket City: Research Advancements Towards Protecting Critical As...TakeDownCon Rocket City: Research Advancements Towards Protecting Critical As...
TakeDownCon Rocket City: Research Advancements Towards Protecting Critical As...
EC-Council
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
ReZa AdineH
 
Social Media Risk Metrics
Social Media Risk MetricsSocial Media Risk Metrics
Social Media Risk Metrics
Iftach Ian Amit
 
How to Operationalize Big Data Security Analytics - Technology Spotlight at I...
How to Operationalize Big Data Security Analytics - Technology Spotlight at I...How to Operationalize Big Data Security Analytics - Technology Spotlight at I...
How to Operationalize Big Data Security Analytics - Technology Spotlight at I...
Interset
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
Kabul Education University
 
Technical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvertTechnical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvert
ISSA LA
 
LTS Cyber Security Analytics
LTS Cyber Security AnalyticsLTS Cyber Security Analytics
LTS Cyber Security Analytics
rver21
 
Cyber security analytics for detect target attacks
Cyber security analytics for detect target attacksCyber security analytics for detect target attacks
Cyber security analytics for detect target attacks
rver21
 
Assessing System Risk the Smart Way
Assessing System Risk the Smart WayAssessing System Risk the Smart Way
Assessing System Risk the Smart Way
Security Innovation
 
Malware Classification and Analysis
Malware Classification and AnalysisMalware Classification and Analysis
Malware Classification and Analysis
Prashant Chopra
 
DevSecCon Asia 2017 Pishu Mahtani: Adversarial Modelling
DevSecCon Asia 2017 Pishu Mahtani: Adversarial ModellingDevSecCon Asia 2017 Pishu Mahtani: Adversarial Modelling
DevSecCon Asia 2017 Pishu Mahtani: Adversarial Modelling
DevSecCon
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment Tools
Pace IT at Edmonds Community College
 
ArquivologiaSolidaria-LucianaDuranti.pdf
ArquivologiaSolidaria-LucianaDuranti.pdfArquivologiaSolidaria-LucianaDuranti.pdf
ArquivologiaSolidaria-LucianaDuranti.pdf
charlley3
 
[HITCON 2020 CTI Village] Threat Hunting and Campaign Tracking Workshop.pptx
[HITCON 2020 CTI Village] Threat Hunting and Campaign Tracking Workshop.pptx[HITCON 2020 CTI Village] Threat Hunting and Campaign Tracking Workshop.pptx
[HITCON 2020 CTI Village] Threat Hunting and Campaign Tracking Workshop.pptx
Chi En (Ashley) Shen
 
How To Turbo-Charge Incident Response With Threat Intelligence
How To Turbo-Charge Incident Response With Threat IntelligenceHow To Turbo-Charge Incident Response With Threat Intelligence
How To Turbo-Charge Incident Response With Threat Intelligence
Resilient Systems
 
RISK MITIGATION AND THREAT IDENTIFICATIONIntroductionInforma.docx
RISK MITIGATION AND THREAT IDENTIFICATIONIntroductionInforma.docxRISK MITIGATION AND THREAT IDENTIFICATIONIntroductionInforma.docx
RISK MITIGATION AND THREAT IDENTIFICATIONIntroductionInforma.docx
joellemurphey
 
How To Turbo-Charge Incident Response With Threat Intelligence
How To Turbo-Charge Incident Response With Threat IntelligenceHow To Turbo-Charge Incident Response With Threat Intelligence
How To Turbo-Charge Incident Response With Threat Intelligence
Resilient Systems
 
ZoneFox, Machine Learning, the Insider Threat and how UEBA protects the user ...
ZoneFox, Machine Learning, the Insider Threat and how UEBA protects the user ...ZoneFox, Machine Learning, the Insider Threat and how UEBA protects the user ...
ZoneFox, Machine Learning, the Insider Threat and how UEBA protects the user ...
ZoneFox
 
How Data Analytics is Re-defining Modern Era in Cyber Security
How Data Analytics is Re-defining Modern Era in Cyber SecurityHow Data Analytics is Re-defining Modern Era in Cyber Security
How Data Analytics is Re-defining Modern Era in Cyber Security
Saqib Chaudhry
 
TakeDownCon Rocket City: Research Advancements Towards Protecting Critical As...
TakeDownCon Rocket City: Research Advancements Towards Protecting Critical As...TakeDownCon Rocket City: Research Advancements Towards Protecting Critical As...
TakeDownCon Rocket City: Research Advancements Towards Protecting Critical As...
EC-Council
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
ReZa AdineH
 
Social Media Risk Metrics
Social Media Risk MetricsSocial Media Risk Metrics
Social Media Risk Metrics
Iftach Ian Amit
 
How to Operationalize Big Data Security Analytics - Technology Spotlight at I...
How to Operationalize Big Data Security Analytics - Technology Spotlight at I...How to Operationalize Big Data Security Analytics - Technology Spotlight at I...
How to Operationalize Big Data Security Analytics - Technology Spotlight at I...
Interset
 
Technical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvertTechnical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvert
ISSA LA
 
LTS Cyber Security Analytics
LTS Cyber Security AnalyticsLTS Cyber Security Analytics
LTS Cyber Security Analytics
rver21
 
Cyber security analytics for detect target attacks
Cyber security analytics for detect target attacksCyber security analytics for detect target attacks
Cyber security analytics for detect target attacks
rver21
 
Assessing System Risk the Smart Way
Assessing System Risk the Smart WayAssessing System Risk the Smart Way
Assessing System Risk the Smart Way
Security Innovation
 
Malware Classification and Analysis
Malware Classification and AnalysisMalware Classification and Analysis
Malware Classification and Analysis
Prashant Chopra
 
DevSecCon Asia 2017 Pishu Mahtani: Adversarial Modelling
DevSecCon Asia 2017 Pishu Mahtani: Adversarial ModellingDevSecCon Asia 2017 Pishu Mahtani: Adversarial Modelling
DevSecCon Asia 2017 Pishu Mahtani: Adversarial Modelling
DevSecCon
 
ArquivologiaSolidaria-LucianaDuranti.pdf
ArquivologiaSolidaria-LucianaDuranti.pdfArquivologiaSolidaria-LucianaDuranti.pdf
ArquivologiaSolidaria-LucianaDuranti.pdf
charlley3
 
[HITCON 2020 CTI Village] Threat Hunting and Campaign Tracking Workshop.pptx
[HITCON 2020 CTI Village] Threat Hunting and Campaign Tracking Workshop.pptx[HITCON 2020 CTI Village] Threat Hunting and Campaign Tracking Workshop.pptx
[HITCON 2020 CTI Village] Threat Hunting and Campaign Tracking Workshop.pptx
Chi En (Ashley) Shen
 
Ad

Recently uploaded (20)

Geometry maths presentation for begginers
Geometry maths presentation for begginersGeometry maths presentation for begginers
Geometry maths presentation for begginers
zrjacob283
 
How iCode cybertech Helped Me Recover My Lost Funds
How iCode cybertech Helped Me Recover My Lost FundsHow iCode cybertech Helped Me Recover My Lost Funds
How iCode cybertech Helped Me Recover My Lost Funds
ireneschmid345
 
Ppt. Nikhil.pptxnshwuudgcudisisshvehsjks
Ppt. Nikhil.pptxnshwuudgcudisisshvehsjksPpt. Nikhil.pptxnshwuudgcudisisshvehsjks
Ppt. Nikhil.pptxnshwuudgcudisisshvehsjks
panchariyasahil
 
LLM finetuning for multiple choice google bert
LLM finetuning for multiple choice google bertLLM finetuning for multiple choice google bert
LLM finetuning for multiple choice google bert
ChadapornK
 
Data Analytics Overview and its applications
Data Analytics Overview and its applicationsData Analytics Overview and its applications
Data Analytics Overview and its applications
JanmejayaMishra7
 
Template_A3nnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn
Template_A3nnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnTemplate_A3nnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn
Template_A3nnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn
cegiver630
 
Adobe Analytics NOAM Central User Group April 2025 Agent AI: Uncovering the S...
Adobe Analytics NOAM Central User Group April 2025 Agent AI: Uncovering the S...Adobe Analytics NOAM Central User Group April 2025 Agent AI: Uncovering the S...
Adobe Analytics NOAM Central User Group April 2025 Agent AI: Uncovering the S...
gmuir1066
 
How to join illuminati Agent in uganda call+256776963507/0741506136
How to join illuminati Agent in uganda call+256776963507/0741506136How to join illuminati Agent in uganda call+256776963507/0741506136
How to join illuminati Agent in uganda call+256776963507/0741506136
illuminati Agent uganda call+256776963507/0741506136
 
Ch3MCT24.pptx measure of central tendency
Ch3MCT24.pptx measure of central tendencyCh3MCT24.pptx measure of central tendency
Ch3MCT24.pptx measure of central tendency
ayeleasefa2
 
Thingyan is now a global treasure! See how people around the world are search...
Thingyan is now a global treasure! See how people around the world are search...Thingyan is now a global treasure! See how people around the world are search...
Thingyan is now a global treasure! See how people around the world are search...
Pixellion
 
Digilocker under workingProcess Flow.pptx
Digilocker  under workingProcess Flow.pptxDigilocker  under workingProcess Flow.pptx
Digilocker under workingProcess Flow.pptx
satnamsadguru491
 
md-presentHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHation.pptx
md-presentHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHation.pptxmd-presentHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHation.pptx
md-presentHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHation.pptx
fatimalazaar2004
 
IAS-slides2-ia-aaaaaaaaaaain-business.pdf
IAS-slides2-ia-aaaaaaaaaaain-business.pdfIAS-slides2-ia-aaaaaaaaaaain-business.pdf
IAS-slides2-ia-aaaaaaaaaaain-business.pdf
mcgardenlevi9
 
Data Science Courses in India iim skills
Data Science Courses in India iim skillsData Science Courses in India iim skills
Data Science Courses in India iim skills
dharnathakur29
 
1. Briefing Session_SEED with Hon. Governor Assam - 27.10.pdf
1. Briefing Session_SEED with Hon. Governor Assam - 27.10.pdf1. Briefing Session_SEED with Hon. Governor Assam - 27.10.pdf
1. Briefing Session_SEED with Hon. Governor Assam - 27.10.pdf
Simran112433
 
Calories_Prediction_using_Linear_Regression.pptx
Calories_Prediction_using_Linear_Regression.pptxCalories_Prediction_using_Linear_Regression.pptx
Calories_Prediction_using_Linear_Regression.pptx
TijiLMAHESHWARI
 
Molecular methods diagnostic and monitoring of infection - Repaired.pptx
Molecular methods diagnostic and monitoring of infection  -  Repaired.pptxMolecular methods diagnostic and monitoring of infection  -  Repaired.pptx
Molecular methods diagnostic and monitoring of infection - Repaired.pptx
7tzn7x5kky
 
Secure_File_Storage_Hybrid_Cryptography.pptx..
Secure_File_Storage_Hybrid_Cryptography.pptx..Secure_File_Storage_Hybrid_Cryptography.pptx..
Secure_File_Storage_Hybrid_Cryptography.pptx..
yuvarajreddy2002
 
Conic Sectionfaggavahabaayhahahahahs.pptx
Conic Sectionfaggavahabaayhahahahahs.pptxConic Sectionfaggavahabaayhahahahahs.pptx
Conic Sectionfaggavahabaayhahahahahs.pptx
taiwanesechetan
 
Simple_AI_Explanation_English somplr.pptx
Simple_AI_Explanation_English somplr.pptxSimple_AI_Explanation_English somplr.pptx
Simple_AI_Explanation_English somplr.pptx
ssuser2aa19f
 
Geometry maths presentation for begginers
Geometry maths presentation for begginersGeometry maths presentation for begginers
Geometry maths presentation for begginers
zrjacob283
 
How iCode cybertech Helped Me Recover My Lost Funds
How iCode cybertech Helped Me Recover My Lost FundsHow iCode cybertech Helped Me Recover My Lost Funds
How iCode cybertech Helped Me Recover My Lost Funds
ireneschmid345
 
Ppt. Nikhil.pptxnshwuudgcudisisshvehsjks
Ppt. Nikhil.pptxnshwuudgcudisisshvehsjksPpt. Nikhil.pptxnshwuudgcudisisshvehsjks
Ppt. Nikhil.pptxnshwuudgcudisisshvehsjks
panchariyasahil
 
LLM finetuning for multiple choice google bert
LLM finetuning for multiple choice google bertLLM finetuning for multiple choice google bert
LLM finetuning for multiple choice google bert
ChadapornK
 
Data Analytics Overview and its applications
Data Analytics Overview and its applicationsData Analytics Overview and its applications
Data Analytics Overview and its applications
JanmejayaMishra7
 
Template_A3nnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn
Template_A3nnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnTemplate_A3nnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn
Template_A3nnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn
cegiver630
 
Adobe Analytics NOAM Central User Group April 2025 Agent AI: Uncovering the S...
Adobe Analytics NOAM Central User Group April 2025 Agent AI: Uncovering the S...Adobe Analytics NOAM Central User Group April 2025 Agent AI: Uncovering the S...
Adobe Analytics NOAM Central User Group April 2025 Agent AI: Uncovering the S...
gmuir1066
 
Ch3MCT24.pptx measure of central tendency
Ch3MCT24.pptx measure of central tendencyCh3MCT24.pptx measure of central tendency
Ch3MCT24.pptx measure of central tendency
ayeleasefa2
 
Thingyan is now a global treasure! See how people around the world are search...
Thingyan is now a global treasure! See how people around the world are search...Thingyan is now a global treasure! See how people around the world are search...
Thingyan is now a global treasure! See how people around the world are search...
Pixellion
 
Digilocker under workingProcess Flow.pptx
Digilocker  under workingProcess Flow.pptxDigilocker  under workingProcess Flow.pptx
Digilocker under workingProcess Flow.pptx
satnamsadguru491
 
md-presentHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHation.pptx
md-presentHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHation.pptxmd-presentHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHation.pptx
md-presentHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHation.pptx
fatimalazaar2004
 
IAS-slides2-ia-aaaaaaaaaaain-business.pdf
IAS-slides2-ia-aaaaaaaaaaain-business.pdfIAS-slides2-ia-aaaaaaaaaaain-business.pdf
IAS-slides2-ia-aaaaaaaaaaain-business.pdf
mcgardenlevi9
 
Data Science Courses in India iim skills
Data Science Courses in India iim skillsData Science Courses in India iim skills
Data Science Courses in India iim skills
dharnathakur29
 
1. Briefing Session_SEED with Hon. Governor Assam - 27.10.pdf
1. Briefing Session_SEED with Hon. Governor Assam - 27.10.pdf1. Briefing Session_SEED with Hon. Governor Assam - 27.10.pdf
1. Briefing Session_SEED with Hon. Governor Assam - 27.10.pdf
Simran112433
 
Calories_Prediction_using_Linear_Regression.pptx
Calories_Prediction_using_Linear_Regression.pptxCalories_Prediction_using_Linear_Regression.pptx
Calories_Prediction_using_Linear_Regression.pptx
TijiLMAHESHWARI
 
Molecular methods diagnostic and monitoring of infection - Repaired.pptx
Molecular methods diagnostic and monitoring of infection  -  Repaired.pptxMolecular methods diagnostic and monitoring of infection  -  Repaired.pptx
Molecular methods diagnostic and monitoring of infection - Repaired.pptx
7tzn7x5kky
 
Secure_File_Storage_Hybrid_Cryptography.pptx..
Secure_File_Storage_Hybrid_Cryptography.pptx..Secure_File_Storage_Hybrid_Cryptography.pptx..
Secure_File_Storage_Hybrid_Cryptography.pptx..
yuvarajreddy2002
 
Conic Sectionfaggavahabaayhahahahahs.pptx
Conic Sectionfaggavahabaayhahahahahs.pptxConic Sectionfaggavahabaayhahahahahs.pptx
Conic Sectionfaggavahabaayhahahahahs.pptx
taiwanesechetan
 
Simple_AI_Explanation_English somplr.pptx
Simple_AI_Explanation_English somplr.pptxSimple_AI_Explanation_English somplr.pptx
Simple_AI_Explanation_English somplr.pptx
ssuser2aa19f
 

Visualizing the Insider Threat: Challenges and tools for identifying malicious user activity

  • 1. Visualizing the Insider Threat: Challenges and tools for identifying malicious user activity Philip A. Legg University of the West of England, UK [email protected]
  • 2. Introduction • What is Insider Threat? • Identifying Insider Threats • Visual Analytics for Insider Threat • Challenges and Limitations • Conclusion
  • 3. Insider Threat • Someone with privileged access and knowledge of an organisation, who uses this in such a way that is detrimental to the operation of the organisation. • E.g., Employees, management, stakeholders, contractors • Examples threats could include intellectual property theft, data fraud, system sabotage, and reputational damage. • Typically, a threat would be initiated by a trigger and a motive (e.g., personal financial difficulties result in theft).
  • 4. Insider Threat • According to the 2015 Insider Threat report by Vormetric: “93% of U.S. organisations polled responded as being vulnerable to insider threats”. “59% of U.S. respondents stated that privileged users pose the biggest threat to their organisation” • How can we mitigate threats without impacting productivity? • Have advances in technology created more opportunity for attack? • Does more activity data equal more success for mitigating threats?
  • 5. Identifying Insider Threat • Given observations of user activity, how can we identify insider threats? • Generate user and role profiles for comparative analysis. • For each user/role: • What devices do they use? • What activities do they perform? • What are the attributes of the activity? • What is the time-profile of each instance?
  • 6. Identifying Insider Threat GroupActivity Type _hourly_usage_ _new_activity_for_device_ _new_attribute_for_device_ _for_role _for_user logon usb_insert email http file • Given a profile of user activity, how can we identify insider threats? • Obtain ‘features’ that characterize potential threats. • New activities, or attributes • Time of the activity/attribute • Frequency of the activity/attribute Examples: logon_new_activity_for_device_for_role A count of how many times that day the user has logged on to a device that has not been accessed before by members of that particular job role. http_hourly_usage_for_user A 24 element count for each hour of activity that involves http usage for this particular user
  • 7. Identifying Insider Threat • Given daily ‘features’ for each user, how can we assess and score user deviation? • One approach – PCA feature decomposition. • Suppose then that a security analyst just receives a threat score for each user for each day… • How do they know how the threat score is computed? • How can they trust that this threat score is valid? • What if they want to understand how the threat score may vary, based on different activity? • There is a need for Visual Analytics to examine the detection process!
  • 10. Overview • Charts provide an interactive overview of selected summary statistics (e.g., amount of activity, deviation of activity). • Support filtering (date range, selection). • Zoomed view of activity by date. • Contextual view of activity by date. • Activity bar chart by job role. • Activity bar chart by individual. Change stat Select users
  • 11. Filter and Zoom • Interactive PCA [Jeong et al.] • Scatter plot view of user daily activity based on PCA. • Parallel co-ordinates shows linked view between plot and profile features. • Can identify groups of outliers, and what features contribute towards the groupings.
  • 12. Filter and Zoom • Dragging points on scatter plot performs inverse PCA. • Analyst can examine relationship between the projection space and the original feature space. • Can be used to identify the contribution or ‘usefulness’ of each feature for refinement of detection model (e.g., apply weighting function to PCA).
  • 13. Detail View • Activity plot that maps user and role activity to time (supports either polar or Cartesian grid layout). • Comparison of user activity on a daily basis, and against others in the same job role. • Could potentially be used in conjunction with other data if available (e.g., HR records, performance reviews). Blue activity shows USB drive insert and removal Late night usage + new observation for this role = threat!
  • 14. Challenges and Limitations • Gathering activity log data for Insider Threat research • Synthetic data versus real-world data? • How well can synthetic data represent normal and malicious activity? • How can real organisations actually share knowledge of insider cases? • Anomalous activity != Malicious activity • Should we be considering hybrid anomaly-signature techniques? • Make use of both the computational power and the human analyst. • Insider Threat Prevention • Ideally, organisations would like to prevent attacks rather than detect. • Requires understanding behavioral pre-cursors of the attack. • How can we collect and analyze data that may inform this approach?
  • 15. Conclusion • We demonstrate the use of a Visual Analytics tool for the purpose of Insider Threat detection and model exploration. • We couple this with a detection routine based on activity profiling and feature decomposition. • Future work is to validate approaches for Insider Threat detection based on real-world deployment • Just how normal are normal users really behaving, and likewise, how malicious are the malicious users?
  • 16. Thank you for your attention Philip A. Legg University of the West of England, UK [email protected]

Editor's Notes

  • #2: Good morning – my name is Phil Legg, I’m from the University of the West of England, and today I’d like to talk about Visualizing the Insider Threat: Challenges and tools for identifying malicious user activity.
  • #3: To begin, I’ll start with looking at what do we mean by insider threat, and then I’ll discuss possible ways of identifying insider threats. I’ll present a visual analytics approach for insider threat detection, and then I’d like to spend some time looking at the challenges and limitations we face with insider threat research. Finally I’ll wrap up with my conclusions.
  • #4: Types of insider threat – not just employees, but anyone with access and knowledge. Trigger – precipitating event to the act of becoming insider. Motive – objective of insider attack.
  • #5: Insider threat is a real problem – businesses are beginning to wake up to this, however it’s taking some time. Security is not top of the priority list for many organisations. Opportunities have always been there – technology helps to widen access and to cover tracks. More data requires better data preprocessing to help the filtering of data – most data will be benign normal activity.
  • #6: CMU-CERT insider threat datasets – typically 1000 employees, 15 roles – 18 months, login, usb, email, web, file.
  • #7: Characterise threats – based on the reports of activity from previous case studies. Additional features could be derived if it was deemed appropriate.
  • #8: There are a number of other techniques that can be used for assessing features – the talk by Simon Walton this afternoon describes this further of how multiple models can be used in a visual analytics loop. Detection should not be a black box – analysts need to know what led to the result that the computer is providing – especially if it can prevent a false accusation of threat. VA can help to discern how and why a user is scored.
  • #9: The visual analytics tool follows the information-seeking mantra – as greg showed earlier: overview, zoom and filter, and details on demand.
  • #11: Change statistics to a normalized anomaly view (e.g., scales anomalies such as e-mail and web, which surpass more indicative things such as logon and usb). IT Admin role scores highest – however all users score high – the role typically have anomaly behaviours. Director role scores second highest – significant difference between one user and his peers.
  • #12: We adopt an Interactive PCA approach for examining the relationship between PCA output and the original input features. Can also study the eigenvalues of the decomposition and select different combinations to show on the scatter plot.
  • #15: What are the additional sensors that we can use for insider threat? Better use and availability of employee reporting tools. Insider threat prevention – as greg showed earlier- minority report.
  • #17: In the process of making the source available from the webpage shown