Insider Threat Likelihood Assessment for Flexible Access Control

被引:2
|
作者
Boulares, Sofiene [1 ]
Adi, Kamel [1 ]
Logrippo, Luigi [1 ]
机构
[1] Univ Quebec Outaouais, Dept Informat & Ingn, Gatineau, PQ, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Information security; Access control; Insider threat; Threat likelihood assessment; Risk assessment;
D O I
10.1007/978-3-319-59041-7_5
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Users who request to access protected objects must obtain the authorization of access control systems. Among the elements of decision for such systems should be the risk of authorizing accesses under various assumptions, and one of the notions of risk is threat likelihood. Access control systems deals essentially with insider threats coming from people within the organization, such as employees, business associates or contractors, who could violate access control policies. We present in this paper a new approach for insider threat likelihood assessment for secrecy and integrity properties by considering reading and writing operations within the context of access control systems. Access operations, the trustworthiness of subjects, the sensitivity of objects, and the applied security countermeasures are all considered in the assessment of the likelihood of this category of insider threats. Both qualitative and quantitative assessments are provided. Hence our approach makes it possible to compare and calculate the likelihoods of these insider threats, leading to more flexible and more informed access control decisions in various situations.
引用
收藏
页码:77 / 95
页数:19
相关论文
共 50 条
  • [21] Access control requirements for preventing insider threats
    Park, Joon S.
    Giordano, Joseph
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3975 : 529 - 534
  • [22] The insider threat ‘zoo’
    Renaud K.
    Warkentin M.
    Computer Fraud and Security, 2024, 2024 (05):
  • [24] Addressing the insider threat
    Application Security Inc
    Netw. Secur., 2008, 3 (11-14):
  • [25] Reflections on the insider threat
    Pfleeger, Charles P.
    INSIDER ATTACK AND CYBER SECURITY: BEYOND THE HACKER, 2008, 39 : 5 - 15
  • [26] Memory Access Pattern based Insider Threat Detection in Big Data Systems
    Aditham, Santosh
    Ranganathan, Nagarajan
    Katkoori, Srinivas
    2016 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2016, : 3625 - 3628
  • [27] RAP-Net: A Resource Access Pattern Network for Insider Threat Detection
    Zhu, Dali
    Huang, Xianjin
    Li, Nan
    Sun, Hongju
    Liu, Meichen
    Liu, Jiguo
    2022 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2022,
  • [28] Insider threat detection for specific threat scenarios
    Tian, Tian
    Zhang, Chen
    Jiang, Bo
    Feng, Huamin
    Lu, Zhigang
    CYBERSECURITY, 2025, 8 (01):
  • [29] The Insider Threat in Cloud Computing
    Kandias, Miltiadis
    Virvilis, Nikos
    Gritzalis, Dimitris
    CRITICAL INFORMATION INFRASTRUCTURE SECURITY, CRITIS 2011, 2013, 6983 : 93 - 103
  • [30] Software Decoys for Insider Threat
    Park, Younghee
    Stolfo, Salvatore J.
    7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,