作者: R. Chinchani , A. Iyer , H.Q. Ngo , S. Upadhyaya
DOI: 10.1109/DSN.2005.94
关键词:
摘要: Insider attacks are a well-known problem acknowledged as threat early 1980s. The is attributed to legitimate users who abuse their privileges, and given familiarity proximity the computational environment, can easily cause significant damage or losses. Due lack of tools techniques, security analysts do not correctly perceive threat, hence consider unpreventable. In this paper, we present theory insider assessment. First, describe modeling methodology which captures several aspects subsequently, show assessment methodologies reveal possible attack strategies an insider.