Addressing Insider Threat through Cost-Sensitive Document Classification - Robotics Institute Carnegie Mellon University

Addressing Insider Threat through Cost-Sensitive Document Classification

Book Section/Chapter, Terrorism Informatics, pp. 451 - 472, December, 2008

Abstract

Most organizations use computerized security systems to manage and protect their confidential information. While security is mostly concerned with prevention of attacks from outsiders, security breaches by insiders have recently gained increasing attention from the security community. In this chapter, we describe a cost-sensitive document classification scheme which forms the basis for determining the legitimacy of confidential access by insiders. Our scheme enforces compliance with the “need to know” security principle, namely that the requests for access are authorized only if the content of the requested information is relevant to the requester’s current information analysis project. First, we formulate such content-based authorization, i.e., whether to accept or reject access requests as a binary classification problem. Second, we implement this problem in a costsensitive learning framework in which the cost caused by incorrect decision is different according to the relative importance of the error types; false positive and false negative. In particular, the cost for a false positive (i.e., accepting a security violating request) is considered more expensive than that of false negative (i.e., rejecting a valid request). The former is a serious security problem because confidential information, which should not be revealed, can be accessed. We experimentally compared various costsensitive classifiers with conventional error-minimizing classifiers. Our results indicate that costing using logistic regression showed the best performance, in terms of the smallest cost paid, the lowest false positive rate, and the relatively low false negative rate.

BibTeX

@incollection{Seo-2008-10145,
author = {Young-Woo Seo and Katia Sycara},
title = {Addressing Insider Threat through Cost-Sensitive Document Classification},
booktitle = {Terrorism Informatics},
chapter = {21},
editor = {E. Reid, H. Chen, J. Sinai, A. Silke},
year = {2008},
month = {December},
pages = {451 - 472},
}