@inproceedings{153b34e491544a1ab3decd1e900879cf,
title = "Modeling and detecting anomalous topic access",
abstract = "There has been considerable success in developing strategies to detect insider threats in information systems based on what one might call the random object access model or ROA. This approach models illegitimate users as ones who randomly access records. The goal is to use statistics, machine learning, knowledge of workflows and other techniques to support an anomaly detection framework that finds such users. In this paper we introduce and study a random topic access model or RTA aimed at users whose access may be illegitimate but is not fully random because it is focused on common semantic themes. We argue that this model is appropriate for a meaningful range of attacks and develop a system based on topic summarization that is able to formalize the model and provide anomalous user detection effectively for it. To this end, we use healthcare as an example and propose a framework for evaluating the ability to recognize various types of random users called random topic access detection or RTAD. Specifically, we utilize a combination of Latent Dirichlet Allocation (LDA), for feature extraction, a k-nearest neighbor (k-NN) algorithm for outlier detection and evaluate the ability to identify different adversarial types. We validate the technique in the context of hospital audit logs where we show varying degrees of success based on user roles and the anticipated characteristics of attackers. In particular, it was found that RTAD exhibits strong performance for roles are described by a few topics, but weaker performance when users are more topic-agnostic.",
keywords = "Access Logs, Anomaly Detection, Data Mining, Electronic Health Records, Healthcare Security, Insider threats",
author = "Siddharth Gupta and Casey Hanson and Gunter, {Carl A.} and Mario Frank and David Liebovitz and Bradley Malin",
year = "2013",
doi = "10.1109/ISI.2013.6578795",
language = "English (US)",
isbn = "9781467362115",
series = "IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics",
pages = "100--105",
booktitle = "IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics",
note = "11th IEEE International Conference on Intelligence and Security Informatics, IEEE ISI 2013 ; Conference date: 04-06-2013 Through 07-06-2013",
}