Towards a theory of insider threat assessment

被引:59
|
作者
Chinchani, R [1 ]
Iyer, A [1 ]
Ngo, HQ [1 ]
Upadhyaya, S [1 ]
机构
[1] SUNY Buffalo, Buffalo, NY 14260 USA
关键词
D O I
10.1109/DSN.2005.94
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Insider attacks are a well-known problem acknowledged as a threat as early as 1980s. The threat is attributed to legitimate users who abuse their privileges, and given their familiarity and proximity to the computational environment, can easily cause significant damage or losses. Due to the lack of tools and techniques, security analysts do not correctly perceive the threat, and hence consider the attacks as unpreventable. In this paper, we present a theory of insider threat assessment. First, we describe a modeling methodology which captures several aspects of insider threat, and subsequently, show threat assessment methodologies to reveal possible attack strategies of an insider
引用
收藏
页码:108 / 117
页数:10
相关论文
共 50 条
  • [41] Towards a threat assessment framework for apps collusion
    Harsha Kumara Kalutarage
    Hoang Nga Nguyen
    Siraj Ahmed Shaikh
    Telecommunication Systems, 2017, 66 : 417 - 430
  • [42] Towards a threat assessment framework for apps collusion
    Kalutarage, Harsha Kumara
    Hoang Nga Nguyen
    Shaikh, Siraj Ahmed
    TELECOMMUNICATION SYSTEMS, 2017, 66 (03) : 417 - 430
  • [43] Towards a Threat Assessment Framework for Ecosystem Services
    Maron, Martine
    Mitchell, Matthew G. E.
    Runting, Rebecca K.
    Rhodes, Jonathan R.
    Mace, Georgina M.
    Keith, David A.
    Watson, James E. M.
    TRENDS IN ECOLOGY & EVOLUTION, 2017, 32 (04) : 240 - 248
  • [44] Towards a generic model for situation and threat assessment
    Paradis, S
    Chalmers, BA
    Carling, R
    Bergeron, P
    DIGITIZATION OF THE BATTLEFIELD II, 1997, 3080 : 171 - 182
  • [45] Insider Threat Program Best Practices
    Guido, Mark D.
    Brooks, Marc W.
    PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 1831 - 1839
  • [46] Cybercrime Countermeasure of Insider Threat Investigation
    Kao, Da-Yu
    2019 21ST INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ICT FOR 4TH INDUSTRIAL REVOLUTION, 2019, : 413 - 418
  • [47] Aspectising honeytokens to contain the insider threat
    Padayachee, Keshnee
    IET INFORMATION SECURITY, 2015, 9 (04) : 240 - 247
  • [48] Weak models for insider threat detection
    Thompson, P
    SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE(C31) TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE III, PTS 1 AND 2, 2004, 5403 : 40 - 48
  • [49] The insider threat to nuclear safety and security
    Healey, Andrew N.
    SECURITY JOURNAL, 2016, 29 (01) : 23 - 38
  • [50] Modeling the emergence of insider threat vulnerabilities
    Martinez-Moyano, Ignacio J.
    Rich, Eliot H.
    Conrad, Stephen H.
    Andersen, David F.
    PROCEEDINGS OF THE 2006 WINTER SIMULATION CONFERENCE, VOLS 1-5, 2006, : 562 - +