Insider Threat Likelihood Assessment for Flexible Access Control

被引:2
|
作者
Boulares, Sofiene [1 ]
Adi, Kamel [1 ]
Logrippo, Luigi [1 ]
机构
[1] Univ Quebec Outaouais, Dept Informat & Ingn, Gatineau, PQ, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Information security; Access control; Insider threat; Threat likelihood assessment; Risk assessment;
D O I
10.1007/978-3-319-59041-7_5
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Users who request to access protected objects must obtain the authorization of access control systems. Among the elements of decision for such systems should be the risk of authorizing accesses under various assumptions, and one of the notions of risk is threat likelihood. Access control systems deals essentially with insider threats coming from people within the organization, such as employees, business associates or contractors, who could violate access control policies. We present in this paper a new approach for insider threat likelihood assessment for secrecy and integrity properties by considering reading and writing operations within the context of access control systems. Access operations, the trustworthiness of subjects, the sensitivity of objects, and the applied security countermeasures are all considered in the assessment of the likelihood of this category of insider threats. Both qualitative and quantitative assessments are provided. Hence our approach makes it possible to compare and calculate the likelihoods of these insider threats, leading to more flexible and more informed access control decisions in various situations.
引用
收藏
页码:77 / 95
页数:19
相关论文
共 50 条
  • [1] Insider Threat Likelihood Assessment for Access Control Systems: Quantitative Approach
    Boulares, Sofiene
    Adi, Kamel
    Logrippo, Luigi
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2016, 2017, 10128 : 135 - 142
  • [2] An insider threat aware access control for cloud relational databases
    Qussai Yaseen
    Yaser Jararweh
    Brajendra Panda
    Qutaibah Althebyan
    Cluster Computing, 2017, 20 : 2669 - 2685
  • [3] Preventative directions for insider threat mitigation via access control
    Sinclair, Sara
    Smith, Sean W.
    INSIDER ATTACK AND CYBER SECURITY: BEYOND THE HACKER, 2008, 39 : 165 - 193
  • [4] An insider threat aware access control for cloud relational databases
    Yaseen, Qussai
    Jararweh, Yaser
    Panda, Brajendra
    Althebyan, Qutaibah
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (03): : 2669 - 2685
  • [5] An Access Abstraction Model for Mitigating the Insider Threat
    Jenkins, Jonathan
    ACMSE 2020: PROCEEDINGS OF THE 2020 ACM SOUTHEAST CONFERENCE, 2020, : 320 - 321
  • [6] Sensing insider threat based on access vectors
    Zhang, Hongbin
    Pei, Qingqi
    Wang, Chao
    Wang, Meihua
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2014, 41 (01): : 110 - 115
  • [7] Towards a theory of insider threat assessment
    Chinchani, R
    Iyer, A
    Ngo, HQ
    Upadhyaya, S
    2005 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2005, : 108 - 117
  • [8] A Framework for Threat Assessment in Access Control Systems
    Khambhammettu, Hemanth
    Boulares, Sofiene
    Adi, Kamel
    Logrippo, Luigi
    INFORMATION SECURITY AND PRIVACY RESEARCH, 2012, 376 : 187 - 198
  • [9] The insider threat: Behavioral indicators and factors influencing likelihood of intervention
    Bell, Alison J. C.
    Rogers, M. Brooke
    Pearce, Julia M.
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2019, 24 : 166 - 176
  • [10] Caught in the Act of an Insider Attack: Detection and Assessment of Insider Threat
    Legg, Philip A.
    Buckley, Oliver
    Goldsmith, Michael
    Creese, Sadie
    2015 IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2015,