Identifying attack patterns for insider threat detection

作者: Ioannis Agrafiotis , Jason RC Nurse , Oliver Buckley , Phil Legg , Sadie Creese

DOI: 10.1016/S1361-3723(15)30066-X

关键词:

摘要: The threat that insiders pose to businesses, institutions and governmental organisations continues be of serious concern. Recent industry surveys provide unequivocal evidence support the significance this its prevalence in enterprises today. 1 In an attempt address challenge, several approaches systems have been proposed by practitioners researchers. These focus on defining insider exploring human psychological factors involved, through detection deterrence these threats via technological behavioural theories. 2 , 3 4 5 6 Insider major concerns organisations. Few solutions problem consider all technical, organisational aspects. new research, Ioannis Agrafiotis, Jason RC Nurse, Oliver Buckley, Phil Legg, Sadie Creese Michael Goldsmith define attack patterns could key assisting insider-threat detection, based 120 real-world case studies. They present their findings, representing each study as a series steps identify common trends between different attacks.

参考文章(7)
Irene vernersson, Open University Press Maidenhead. ,(2000)
Philip A Legg, Nick Moffat, Jason RC Nurse, Jassim Happa, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese, None, Towards a conceptual model and reasoning structure for insider threat detection Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. ,vol. 4, pp. 20- 37 ,(2013) , 10.22667/JOWUA.2013.12.31.020
Christian W. Probst, Jeffrey Hunker, Insiders and Insider Threats: An Overview of Definitions and Mitigation Techniques Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. ,vol. 2, pp. 4- 27 ,(2011)
Philip A Legg, Oliver Buckley, Michael Goldsmith, Sadie Creese, None, Caught in the act of an insider attack: detection and assessment of insider threat ieee international conference on technologies for homeland security. pp. 1- 6 ,(2015) , 10.1109/THS.2015.7446229
Jason RC Nurse, Oliver Buckley, Philip A Legg, Michael Goldsmith, Sadie Creese, Gordon RT Wright, Monica Whitty, None, Understanding Insider Threat: A Framework for Characterising Attacks ieee symposium on security and privacy. pp. 214- 228 ,(2014) , 10.1109/SPW.2014.38
Oliver Brdiczka, Juan Liu, Bob Price, Jianqiang Shen, Akshay Patil, Richard Chow, Eugene Bart, Nicolas Ducheneaut, Proactive Insider Threat Detection through Graph Learning and Psychological Context ieee symposium on security and privacy. pp. 142- 149 ,(2012) , 10.1109/SPW.2012.29
Frank L. Greitzer, Ryan E. Hohimer, Modeling Human Behavior to Anticipate Insider Attacks Journal of Strategic Security. ,vol. 4, pp. 25- 48 ,(2011) , 10.5038/1944-0472.4.2.2