Award Abstract # 2103829
SaTC: CORE: Small: Deep Learning for Insider Threat Detection

NSF Org: CNS
Division Of Computer and Network Systems
Recipient: UTAH STATE UNIVERSITY
Initial Amendment Date: March 15, 2021
Latest Amendment Date: May 21, 2021
Award Number: 2103829
Award Instrument: Standard Grant
Program Manager: Karen Karavanic
kkaravan@nsf.gov
 (703)292-2594
CNS
 Division Of Computer and Network Systems
CSE
 Direct For Computer & Info Scie & Enginr
Start Date: June 1, 2021
End Date: May 31, 2025 (Estimated)
Total Intended Award Amount: $498,618.00
Total Awarded Amount to Date: $498,618.00
Funds Obligated to Date: FY 2021 = $498,618.00
History of Investigator:
  • Shuhan Yuan (Principal Investigator)
    Shuhan.Yuan@usu.edu
Recipient Sponsored Research Office: Utah State University
1000 OLD MAIN HL
LOGAN
UT  US  84322-1000
(435)797-1226
Sponsor Congressional District: 01
Primary Place of Performance: Utah State University
4205 Old Main Hill
Logan
UT  US  84322-4205
Primary Place of Performance
Congressional District:
01
Unique Entity Identifier (UEI): SPE2YDWHDYU4
Parent UEI:
NSF Program(s): Secure &Trustworthy Cyberspace
Primary Program Source: 01002122DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 025Z, 7923
Program Element Code(s): 806000
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

Insiders are malicious people within organizations who abuse their authorized access in a manner that compromises the confidentiality, integrity, or availability of information systems. Attacks from insiders are hard to detect and can cause significant loss to organizations. While the problem of insider threat detection has been studied for a long time, the traditional machine learning-based detection approaches, which heavily rely on feature engineering, are hard to accurately capture the behavior difference between insiders and normal users due to the dynamic and adaptive nature of insider threats. Advanced deep learning techniques provide a new paradigm to learn end-to-end insider threat detection models from complex user behavior data. This project develops a deep learning framework for insider threat detection. The project?s novelties are the development of self-supervised user behavior representation learning, few-shot learning for malicious session detection, reinforcement learning for adaptive behavior detection, and counterfactual explanations based malicious activity detection. The project?s broader significance and importance are to provide a novel toolset for detecting and mitigating internal security risks, which can be benefit industries and governments who are frequently under attacks from malicious insiders.

This project develops novel deep learning approaches to detect malicious sessions through a) developing a self-supervised representation learning approach to encode user sessions into a low-dimensional embedding space without using any manually labeled data, b) advancing a few-shot learning framework via disentangled representation learning to detect malicious sessions with subtle activity changes, c) adapting reinforcement learning framework to identify dynamically evolving insider attacks, and d) proposing a counterfactual explanation approach to detect malicious activities in malicious sessions. The framework has the potential to extend to different types of fraud detection.

This award reflects NSF's statutory mission and has been deemed worthy of support through evaluation using the Foundation's intellectual merit and broader impacts review criteria.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

(Showing: 1 - 10 of 16)
Xu, Depeng and Yuan, Shuhan and Wang, Yueyang and Nwude, Angela Uchechukwu and Zhang, Lu and Zajieck, Anna and Wu, Xintao "Coded Hate Speech Detection via Contextual Information" Pacific-Asia Conference on Knowledge Discovery and Data Mining , 2022 https://doi.org/https://doi.org/10.1007/978-3-031-05933-9_8 Citation Details
Han, Xiao and Zhang, Lu and Wu, Yongkai and Yuan, Shuhan "Achieving Counterfactual Fairness for Anomaly Detection" Pacific-Asia Conference on Knowledge Discovery and Data Mining , 2023 Citation Details
Zheng, Panpan and Yuan, Shuhan and Wu, Xintao "Using Dirichlet Marked Hawkes Processes for Insider Threat Detection" Digital Threats: Research and Practice , v.3 , 2022 https://doi.org/10.1145/3457908 Citation Details
Han, Xiao and Cheng, He and Xu, Depeng and Yuan, Shuhan "InterpretableSAD: Interpretable Anomaly Detection in Sequential Log Data" 2021 IEEE International Conference on Big Data (Big Data) , 2021 https://doi.org/10.1109/BigData52589.2021.9671642 Citation Details
Zheng, Panpan and Yuan, Shuhan and Wu, Xintao and Wu, Yubao "Hidden Buyer Identification in Darknet Markets via Dirichlet Hawkes Process" 2021 IEEE International Conference on Big Data (Big Data) , 2021 https://doi.org/10.1109/BigData52589.2021.9671406 Citation Details
Han, Xiao and Yuan, Shuhan "Unsupervised Cross-system Log Anomaly Detection via Domain Adaptation" 30th ACM International Conference on Information & Knowledge Management , 2021 https://doi.org/10.1145/3459637.3482209 Citation Details
Guo, Haixuan and Yuan, Shuhan and Wu, Xintao "LogBERT: Log Anomaly Detection via BERT" 2021 International Joint Conference on Neural Networks (IJCNN) , 2021 https://doi.org/10.1109/IJCNN52387.2021.9534113 Citation Details
M.S., Vinay and Yuan, Shuhan and Wu, Xintao "Fraud Detection via Contrastive Positive Unlabeled Learning" 2022 IEEE International Conference on Big Data (Big Data) , 2022 https://doi.org/10.1109/BigData55660.2022.10020693 Citation Details
Cheng, He and Xu, Depeng and Yuan, Shuhan "Sequential Anomaly Detection with Local and Global Explanations" 2022 IEEE International Conference on Big Data (Big Data) , 2022 https://doi.org/10.1109/BigData55660.2022.10020990 Citation Details
Han, Xiao and Xu, Depeng and Yuan, Shuhan and Wu, Xintao "Few-shot Anomaly Detection and Classification Through Reinforced Data Selection" 2022 IEEE International Conference on Data Mining (ICDM) , 2022 https://doi.org/10.1109/ICDM54844.2022.00115 Citation Details
Zhao, Xingyi and Zhang, Lu and Xu, Depeng and Yuan, Shuhan "Generating Textual Adversaries with Minimal Perturbation" Findings of the Association for Computational Linguistics: EMNLP 2022 , 2022 Citation Details
(Showing: 1 - 10 of 16)

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page