Insider Detection by Process Analysis

作者: George S. Avrunin , Borislava I. Simidchieva , Sean Peisert , Heather M. Conboy , Lori A. Clarke

DOI:

关键词:

摘要: The insider threat is one of the most pernicious in computer security. Traditional approaches typically instrument systems with decoys or intrusion detection mechanisms to detect individuals who abuse their privileges (the quintessential ). Such an attack requires that these agents have access resources data order corrupt disclose them. In this work, we examine application process modeling and subsequent analyses problem. With modeling, first describe how a works formal terms. We then look at are carrying out particular tasks, perform different determine can be compromised, suggest countermeasures incorporated into model improve its resistance attack.

参考文章(52)
George Avrunin, Lori A. Clarke, Matt Bishop, Leon J. Osterweil, Huong Phan, A systematic process-model-based approach for synthesizing attacks and evaluating them conference on electronic voting technology workshop on trustworthy elections. pp. 10- 10 ,(2012)
Richard C. Brackney, Robert H. Anderson, Understanding the Insider Threat: Proceedings of a March 2004 Workshop ,(2005)
P Buckle, PJ Clarkson, MN Lyons, S Barclay, Ward, J Anderson, Using fault tree analysis (FTA) in healthcare: a case study of repeat prescribing in primary care N/A. ,(2007)
Sean Peisert, Matt Bishop, Dynamic, Flexible, and Optimistic Access Control ,(2013)
Christian W. Probst, René Rydhof Hansen, Flemming Nielson, Where Can an Insider Attack? Formal Aspects in Security and Trust. pp. 127- 142 ,(2006) , 10.1007/978-3-540-75227-1_9
Brian M. Bowen, Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo, Baiting Inside Attackers Using Decoy Documents international conference on security and privacy in communication systems. ,vol. 19, pp. 51- 70 ,(2008) , 10.1007/978-3-642-05284-2_4
Miltiadis Kandias, Alexios Mylonas, Nikos Virvilis, Marianthi Theoharidou, Dimitris Gritzalis, An insider threat prediction model trust and privacy in digital business. pp. 26- 37 ,(2010) , 10.1007/978-3-642-15152-1_3
George S. Avrunin, Lori A. Clarke, Bin Chen, Improving processes using static analysis techniques University of Massachusetts Amherst. ,(2011)
Peter G. Neumann, Combatting Insider Threats Insider Threats in Cyber Security. ,vol. 49, pp. 17- 44 ,(2010) , 10.1007/978-1-4419-7133-3_2