%AGegan, Ross%APerry, Brian%AGhosal, Dipak%ABishop, Matt%Anull Ed.%D2020%I %K %MOSTI ID: 10210345 %PMedium: X %TInsider Attack Detection for Science DMZs Using System Performance Data %XThe science DMZ is a specialized network model developed to guarantee secure and efficient transfer of data for large-scale distributed research. To enable a high level of performance, the Science DMZ includes dedicated data transfer nodes (DTNs). Protecting these DTNs is crucial to maintaining the overall security of the network and the data, and insider attacks are a major threat. Although some limited network intrusion detection systems (NIDS) are deployed to monitor DTNs, this alone is not sufficient to detect insider threats. Monitoring for abnormal system behavior, such as unusual sequences of system calls, is one way to detect insider threats. However, the relatively predictable behavior of the DTN suggests that we can also detect unusual activity through monitoring system performance, such as CPU and disk usage, along with network activity. In this paper, we introduce a potential insider attack scenario, and show how readily available system performance metrics can be employed to detect data tampering within DTNs, using DBSCAN clustering to actively monitor for unexpected behavior. Country unknown/Code not availablehttps://doi.org/10.1109/CNS48642.2020.9162260OSTI-MSA