Using Identity Credential Usage Logs to Detect Anomalous ...

Using Identity Credential Usage Logs to Detect Anomalous ...

Using Identity Credential Usage Logs to Detect Anomalous Service Accesses ACM DIM 2009, Chicago, IL, 2009 Daisuke Mashima Dr. Mustaque Ahamad College of Computing Georgia Institute of Technology Atlanta, GA, USA Increasing Risk of Identity Theft Variety of online identity credentials Passwords, certificates, SSN, credit card number, etc.

Loss and theft are possible and common Consequence of online identity theft Impersonation Disclosure of sensitive information Financial loss 2 To counter such threats Online service providers are required to Analyze huge amount of log records to identify suspicious service accesses Investigate identified records extensively

In reality Significant reliance on human experts Not processed in real-time basis Automated mechanism to monitor identity usage (service accesses) is desired. 3 Outline

Observations from real data sets Our approach Anomaly-based risk scoring scheme Preliminary evaluation Conclusion / Future Work 4 Buzzport Access Log 5 Buzzport Access Log

380484533347391, 380484533347391, 380484533347391, 380484533347391, 380484533347391, 24/08/2007 14:07:05, 27/08/2007 08:01:14, 27/08/2007 08:04:36, 27/08/2007 12:05:36, 31/08/2007 14:31:43, 24/08/2007 14:18:46 27/08/2007 08:02:54

27/08/2007 08:16:05 27/08/2007 12:18:15 31/08/2007 14:38:08 Contain only (Anonymized) User ID Login timestamp Logout timestamp 6 Another data set Log records of a portal of online trading company

The following items are available: User ID Coarse Action Type (Login / Logout) Timestamp IP Address Organization Name etc. 7 Observations and Considerations Available information is quite limited. Typical fraud detection systems rely on much richer information Data are not labeled.

Supervised techniques are not available. Limited types of events can be observed. Schemes relying on event sequence or state transition have limited applicability. 8 Our Approach Utilize attributes derived from an individual identity usage record Timestamp (day-ofweek etc.), IP address, etc. Focus on categorical attributes Build user profile based on occurrence

frequency of each attribute value Determine risk scores based on frequency information 9 User Profile Management Defined as a frequency distribution of attribute values (categories) One profile for one attribute Multiple profiles can be defined per user. Day-of-week profile, hour-of-day profile, and so forth Updated upon receipt of each log record Simply increment occurrence counters corresponding

to the attribute values in the record Data aging can be easily implemented Periodically multiply all counters with some decay factor 10 Base Score and Weight Base score represents how unlikely an observed users access is. BaseScore = -log (RelativeFrequency) Score weight quantifies the effectiveness of each attribute for profiling.

When an attribute well characterizes users identity usage pattern, the value should be high. How can we quantify it? 11 Score Weight Use distance between the frequency distribution and uniform distribution as weight Bhattacharyya Distance etc. Data aging is necessary. 0.25 0.2 0.15

0.1 23 21 17 15 19 Hour of Day

13 11 9 7 5 0 3

0.05 1 Relative Frequency 12 Score Aggregation Sub Score (a product of a base score and the corresponding weight) are computed. Sub Score is computed for each profile. How can we combine Sub Scores?

Pick the MAX of Sub Scores Weighted sum of Sub Scores Others? 13

Setting of Experiments Buzzport data set Profiling attributes Week of month (5 categories) Day of week (7 categories) Hour of Day (24 categories) Scale Sub Scores in [0, 100) Use MAX of 3 Sub Scores as output 14 Trends of Risk Scores 15

Trends of Risk Scores with Data Aging Decay Factor = 0.5 is applied monthly. 16 False Positive / True Positive Analysis Randomly pick 5 users with different access frequency Split each users log records into two: Test data: last 1 month Training data: Rest of them

Analyze False Positive rate by using the same users training data and test data Analyze True Positive rate by using different users data sets (a.k.a Cross Profiling) 17 False Positive / True Positive Results * Each users threshold is determined based on the score range of the training data. 18 Time / Storage Cost Measured on Linux PC with Intel Core 2 Duo E6600 and 3GM RAM

Average time per record: 5ms Good enough for real-time processing Storage space per user: 1.4KB Potential to accommodate a large number of users 19 Conclusion Defined design principles for risk scoring based on identity usage logs Proposed a way to compute anomalybased risk scores in real-time basis Presented a prototype system using time

stamp information and showed that it has reasonably good accuracy 20 Future Work Investigate other attributes (E.g. location) Conduct detailed experiments Evaluate with other data sets Find the optimum configuration Integrate into other security mechanisms 21

Thank you very much. Questions? [email protected] http://www.cc.gatech.edu/~mashima 22

Recently Viewed Presentations

  • Northern Cape Provincial Skills Development Framework

    Northern Cape Provincial Skills Development Framework

    the goals of the National Skills Development Strategy (NSDS), the strategic objectives of the Human Resource Development Strategy for South Africa (HRDS-SA), and the objectives of national skills and HRD-related priorities, strategies, frameworks and commitments such as NDP Chapter 9...
  • Speaker Intro - NPAIHB

    Speaker Intro - NPAIHB

    Target Audience. The overarching goal of PCSS is to train a diverse range of healthcare professionals in the safe and effective prescribing of opioid medications for the treatment of pain, as well as the treatment of substance use disorders, particularly...
  • ASTM International Overview and Collaboration with West Africa

    ASTM International Overview and Collaboration with West Africa

    Effective and Relevant Around The World. The Role of Standards. We rely on our world-wide members' expertise and commitment - their good science, good engineering and good judgment
  • Physical Science

    Physical Science

    Why? Which weighs more a pound of feathers or a pound of lead? Weight and density are different!! Cover the variable that you are solving for and the correct formula is revealed! 3. What is the density of a 120.0g...
  • Aesop and His Fables

    Aesop and His Fables

    Presidents Day can also be written as President's Day or Presidents' Day. Presidents Day As time went by, people in the United States decided it was rather silly to honor only two of our presidents on Presidents Day, when all...
  • Active Learning: Materials

    Active Learning: Materials

    For example, empty bottles, old utensils, cardboard tubes, bubble wrap, fabric and yarn, eyeglass cases, old tools, cookie tins, shoes, gloves, and so forth. Collecting materials can also make for a great scouting project or volunteer activity.
  • BESE April 2017 Item 1: Civic Learning and Engagement Powerpoint

    BESE April 2017 Item 1: Civic Learning and Engagement Powerpoint

    Gain Board feedback. Massachusetts Department of Elementary and Secondary Education. Background ... MA Board of Elementary and Secondary Education Working Group on Civic Learning and Engagement, June 2015.
  • Nausea and Vomiting in Pregnancy: Pharmacologic and Non-Pharmacologic

    Nausea and Vomiting in Pregnancy: Pharmacologic and Non-Pharmacologic

    Case Presentation: HPI: Ms. P is a 30 y/o G4P2012 @ 13 wks 2/7 days seen in clinic for her second pre-natal visit. LMP 12/3/08, EDD 9/9/09 based on LMP. Today pt. reporting continued nausea and vomiting, since the onset...