AIセキュリティポータル K Program
Audit-LLM: Multi-Agent Collaboration for Log-based Insider Threat Detection
Share
Abstract
Log-based insider threat detection (ITD) detects malicious user activities by auditing log entries. Recently, large language models (LLMs) with strong common sense knowledge have emerged in the domain of ITD. Nevertheless, diverse activity types and overlong log files pose a significant challenge for LLMs in directly discerning malicious ones within myriads of normal activities. Furthermore, the faithfulness hallucination issue from LLMs aggravates its application difficulty in ITD, as the generated conclusion may not align with user commands and activity context. In response to these challenges, we introduce Audit-LLM, a multi-agent log-based insider threat detection framework comprising three collaborative agents: (i) the Decomposer agent, breaking down the complex ITD task into manageable sub-tasks using Chain-of-Thought (COT) reasoning;(ii) the Tool Builder agent, creating reusable tools for sub-tasks to overcome context length limitations in LLMs; and (iii) the Executor agent, generating the final detection conclusion by invoking constructed tools. To enhance conclusion accuracy, we propose a pair-wise Evidence-based Multi-agent Debate (EMAD) mechanism, where two independent Executors iteratively refine their conclusions through reasoning exchange to reach a consensus. Comprehensive experiments conducted on three publicly available ITD datasets-CERT r4.2, CERT r5.2, and PicoDomain-demonstrate the superiority of our method over existing baselines and show that the proposed EMAD significantly improves the faithfulness of explanations generated by LLMs.
Insight into insiders and IT: A survey of insider threat taxonomies, analysis, modeling, and countermeasures
F. Homoliak, F. Toffalini, J. Guarnizo
Published: 2019
Deeplog: Anomaly detection and diagnosis from system logs through deep learning
M. Du, F. Li, G. Zheng, V. Srikumar
Published: 2017
Training regime influences to semi-supervised learning for insider threat detection
D. C. Le, N. Zincir-Heywood, M. I. Heywood
Published: 2021
A high accuracy and adaptive anomaly detection model with dual-domain graph convolutional network for insider threat detection
X. Li, X. Li, J. Jia
Published: 2023
Deep Learning for Insider Threat Detection: Review, Challenges and Opportunities
Shuhan Yuan, Xintao Wu
Published: 2020.5.26
Loggpt: Exploring chatgpt for log-based anomaly detection
J. Qi, S. Huang, Z. Luan
Published: 2023
Crimson: Empowering Strategic Reasoning in Cybersecurity through Large Language Models
Jiandong Jin, Bowen Tang, Mingxuan Ma, Xiao Liu, Yunfei Wang, Qingnan Lai, Jia Yang, Changling Zhou
Published: 2024.3.1
Bridging the gap: A pragmatic approach to generating insider threat data
J. Glasser, B. Lindauer
Published: 2013
Leveraging partial symmetry for multi-agent reinforcement learning
X. Yu, R. Shi, P. Feng
Published: 2024
Enhancing multi-agent communication collaboration through gpt-based semantic information extraction and prediction
X. Deng, L. Zhou, D. Dong
Published: 2024
Chain-of-thought improves text generation with citations in large language models
B. Ji, H. Liu, M. Du
Published: 2024
Proactive insider threat detection through graph learning and psychological context
O. Brdiczka, J. Liu, B. Price
Published: 2012
Temporal and spatial locality: An abstraction for masquerade detection
J. B. Camina, R. Monroy, L. A. Trejo, M. A. Medina-Perez
Published: 2016
A tripwire grammar for insider threat detection
I. Agrafiotis, A. Erola, M. Goldsmith, S. Creese
Published: 2016
The insider threat prediction and specification language
G. Magklaras, S. Furnell
Published: 2012
Insider threat detection via hierarchical neural temporal point processes
S. Yuan, P. Zheng, X. Wu, Q. Li
Published: 2019
Log2vec: A heterogeneous graph embedding based approach for detecting cyber threats within enterprise
F. Liu, Y. Wen, D. Zhang
Published: 2019
Lmtracker: Lateral movement path detection based on heterogeneous graph embedding
Y. Fang, C. Wang, Z. Fang, C. Huang
Published: 2022
AutoAttacker: A Large Language Model Guided System to Implement Automatic Cyber-attacks
Jiacen Xu, Jack W. Stokes, Geoff McDonald, Xuesong Bai, David Marshall, Siyue Wang, Adith Swaminathan, Zhou Li
Published: 2024.3.2
Toward autonomy: Metacognitive learning for enhanced AI performance
B. Conway-Smith, R. L. West
Published: 2024
Programming by examples
M. A. Bauer
Published: 1979
Unveiling shadows: A comprehensive framework for insider threat detection based on statistical and sequential analysis
H. Xiao, Y. Zhu, B. Zhang
Published: 2024
Hetglm: Lateral movement detection by discovering anomalous links with heterogeneous graph neural network
X. Sun, J. Yang
Published: 2022
Detecting abnormal logins by discovering anomalous links via graph transformers
L. Gonçalves, C. Zanchettin
Published: 2024
Share