Towards a theory of insider threat assessment

被引:59
|
作者
Chinchani, R [1 ]
Iyer, A [1 ]
Ngo, HQ [1 ]
Upadhyaya, S [1 ]
机构
[1] SUNY Buffalo, Buffalo, NY 14260 USA
关键词
D O I
10.1109/DSN.2005.94
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Insider attacks are a well-known problem acknowledged as a threat as early as 1980s. The threat is attributed to legitimate users who abuse their privileges, and given their familiarity and proximity to the computational environment, can easily cause significant damage or losses. Due to the lack of tools and techniques, security analysts do not correctly perceive the threat, and hence consider the attacks as unpreventable. In this paper, we present a theory of insider threat assessment. First, we describe a modeling methodology which captures several aspects of insider threat, and subsequently, show threat assessment methodologies to reveal possible attack strategies of an insider
引用
收藏
页码:108 / 117
页数:10
相关论文
共 50 条
  • [31] Insider Threat Detection in PRODIGAL
    Goldberg, Henry G.
    Young, William T.
    Reardon, Matthew G.
    Phillips, Brian J.
    Senator, Ted E.
    PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 2648 - 2657
  • [32] Safeguarding against the insider threat
    Bulpett B.
    Network Security, 2020, 2020 (06): : 14 - 17
  • [33] Balancing the insider and outsider threat
    Walton, Richard
    Limited, Walton-Mackenzie
    Computer Fraud and Security, 2006, 2006 (11): : 8 - 11
  • [34] A Method of Evaluation for Insider Threat
    Wang, Yi-Lu
    Yang, Sang-Chin
    2014 INTERNATIONAL SYMPOSIUM ON COMPUTER, CONSUMER AND CONTROL (IS3C 2014), 2014, : 438 - 441
  • [35] Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection
    Tian, Zhihong
    Shi, Wei
    Tan, Zhiyuan
    Qiu, Jing
    Sun, Yanbin
    Jiang, Feng
    Liu, Yan
    MOBILE NETWORKS & APPLICATIONS, 2020, 29 (5): : 1680 - 1689
  • [36] Survival analysis for insider threat Detecting insider threat incidents using survival analysis techniques
    Alhajjar, Elie
    Bradley, Taylor
    COMPUTATIONAL AND MATHEMATICAL ORGANIZATION THEORY, 2022, 28 (04) : 335 - 351
  • [37] TOWARDS A USER AND ROLE-BASED BEHAVIOR ANALYSIS METHOD FOR INSIDER THREAT DETECTION
    Lv, Qiujian
    Wang, Yan
    Wang, Leigi
    Wang, Dan
    PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT (IEEE IC-NIDC), 2018, : 6 - 10
  • [38] An assessment of opportunity-reducing techniques in information security: An insider threat perspective
    Padayachee, Keshnee
    DECISION SUPPORT SYSTEMS, 2016, 92 : 47 - 56
  • [39] Shadow-IT System and Insider Threat: An Assessment of an Opportunity Dimension for the Identity Theft
    Shaikh, Asif
    HCI INTERNATIONAL 2018 - POSTERS' EXTENDED ABSTRACTS, PT III, 2018, 852 : 314 - 317
  • [40] Towards More Effective Insider Threat Countermeasures: A Survey of Approaches for Addressing Challenges and Limitations
    Gonzales, Omar
    Huang, Shihong
    Yang, KwangSoo
    18TH ANNUAL IEEE INTERNATIONAL SYSTEMS CONFERENCE, SYSCON 2024, 2024,