Using Identity Credential Usage Logs to Detect Anomalous ...
Using Identity Credential Usage Logs to Detect Anomalous Service Accesses ACM DIM 2009, Chicago, IL, 2009 Daisuke Mashima Dr. Mustaque Ahamad College of Computing Georgia Institute of Technology Atlanta, GA, USA Increasing Risk of Identity Theft Variety of online identity credentials Passwords, certificates, SSN, credit card number, etc.
Loss and theft are possible and common Consequence of online identity theft Impersonation Disclosure of sensitive information Financial loss 2 To counter such threats Online service providers are required to Analyze huge amount of log records to identify suspicious service accesses Investigate identified records extensively
In reality Significant reliance on human experts Not processed in real-time basis Automated mechanism to monitor identity usage (service accesses) is desired. 3 Outline
Observations from real data sets Our approach Anomaly-based risk scoring scheme Preliminary evaluation Conclusion / Future Work 4 Buzzport Access Log 5 Buzzport Access Log
27/08/2007 08:16:05 27/08/2007 12:18:15 31/08/2007 14:38:08 Contain only (Anonymized) User ID Login timestamp Logout timestamp 6 Another data set Log records of a portal of online trading company
The following items are available: User ID Coarse Action Type (Login / Logout) Timestamp IP Address Organization Name etc. 7 Observations and Considerations Available information is quite limited. Typical fraud detection systems rely on much richer information Data are not labeled.
Supervised techniques are not available. Limited types of events can be observed. Schemes relying on event sequence or state transition have limited applicability. 8 Our Approach Utilize attributes derived from an individual identity usage record Timestamp (day-ofweek etc.), IP address, etc. Focus on categorical attributes Build user profile based on occurrence
frequency of each attribute value Determine risk scores based on frequency information 9 User Profile Management Defined as a frequency distribution of attribute values (categories) One profile for one attribute Multiple profiles can be defined per user. Day-of-week profile, hour-of-day profile, and so forth Updated upon receipt of each log record Simply increment occurrence counters corresponding
to the attribute values in the record Data aging can be easily implemented Periodically multiply all counters with some decay factor 10 Base Score and Weight Base score represents how unlikely an observed users access is. BaseScore = -log (RelativeFrequency) Score weight quantifies the effectiveness of each attribute for profiling.
When an attribute well characterizes users identity usage pattern, the value should be high. How can we quantify it? 11 Score Weight Use distance between the frequency distribution and uniform distribution as weight Bhattacharyya Distance etc. Data aging is necessary. 0.25 0.2 0.15
0.1 23 21 17 15 19 Hour of Day
13 11 9 7 5 0 3
0.05 1 Relative Frequency 12 Score Aggregation Sub Score (a product of a base score and the corresponding weight) are computed. Sub Score is computed for each profile. How can we combine Sub Scores?
Pick the MAX of Sub Scores Weighted sum of Sub Scores Others? 13
Setting of Experiments Buzzport data set Profiling attributes Week of month (5 categories) Day of week (7 categories) Hour of Day (24 categories) Scale Sub Scores in [0, 100) Use MAX of 3 Sub Scores as output 14 Trends of Risk Scores 15
Trends of Risk Scores with Data Aging Decay Factor = 0.5 is applied monthly. 16 False Positive / True Positive Analysis Randomly pick 5 users with different access frequency Split each users log records into two: Test data: last 1 month Training data: Rest of them
Analyze False Positive rate by using the same users training data and test data Analyze True Positive rate by using different users data sets (a.k.a Cross Profiling) 17 False Positive / True Positive Results * Each users threshold is determined based on the score range of the training data. 18 Time / Storage Cost Measured on Linux PC with Intel Core 2 Duo E6600 and 3GM RAM
Average time per record: 5ms Good enough for real-time processing Storage space per user: 1.4KB Potential to accommodate a large number of users 19 Conclusion Defined design principles for risk scoring based on identity usage logs Proposed a way to compute anomalybased risk scores in real-time basis Presented a prototype system using time
stamp information and showed that it has reasonably good accuracy 20 Future Work Investigate other attributes (E.g. location) Conduct detailed experiments Evaluate with other data sets Find the optimum configuration Integrate into other security mechanisms 21
Thank you very much. Questions? [email protected] http://www.cc.gatech.edu/~mashima 22
the goals of the National Skills Development Strategy (NSDS), the strategic objectives of the Human Resource Development Strategy for South Africa (HRDS-SA), and the objectives of national skills and HRD-related priorities, strategies, frameworks and commitments such as NDP Chapter 9...
Target Audience. The overarching goal of PCSS is to train a diverse range of healthcare professionals in the safe and effective prescribing of opioid medications for the treatment of pain, as well as the treatment of substance use disorders, particularly...
Why? Which weighs more a pound of feathers or a pound of lead? Weight and density are different!! Cover the variable that you are solving for and the correct formula is revealed! 3. What is the density of a 120.0g...
Presidents Day can also be written as President's Day or Presidents' Day. Presidents Day As time went by, people in the United States decided it was rather silly to honor only two of our presidents on Presidents Day, when all...
For example, empty bottles, old utensils, cardboard tubes, bubble wrap, fabric and yarn, eyeglass cases, old tools, cookie tins, shoes, gloves, and so forth. Collecting materials can also make for a great scouting project or volunteer activity.
Gain Board feedback. Massachusetts Department of Elementary and Secondary Education. Background ... MA Board of Elementary and Secondary Education Working Group on Civic Learning and Engagement, June 2015.
Case Presentation: HPI: Ms. P is a 30 y/o G4P2012 @ 13 wks 2/7 days seen in clinic for her second pre-natal visit. LMP 12/3/08, EDD 9/9/09 based on LMP. Today pt. reporting continued nausea and vomiting, since the onset...
Ready to download the document? Go ahead and hit continue!