ISMS insider intrusion prevention and detection

نویسنده

  • Richard E. Overill
چکیده

A wide variety of different techniques and technologies are potentially applicable for ISMS insider intrusion prevention and detection. In this report we examine three approaches that have not been reviewed in any great detail recently, namely: simulation and modelling, scenario gaming and game theory, and artificial learning technologies. We show how each of these diverse approaches might be applicable to particular corporate scenarios that may eventuate as a result of potential insider intrusions into an ISMS. a 2008 Elsevier Ltd. All rights reserved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Yet Another Intrusion Detection System Against Insider Attacks

detection and prevention (gateways, firewalls, IDS/IPS), tracking, tracing Another reason is the Protect data privacy against insider attacks: traceable system. However defending organizations from insider attacks is becoming a In that case, the retail company was informed by a malware detection system of intrusion, but the delayed because their other security tools failed to detect the intrusion.

متن کامل

Intelligent Agents for Distributed Intrusion Detection System

This paper presents a distributed intrusion detection system IDS, based on the concept of specialized distributed agents community representing agents with the same purpose for detecting distributed attacks. The semantic of intrusion events occurring in a predetermined network has been defined. The correlation rules referring the process which our proposed IDS combines the captured events that ...

متن کامل

Design of Intrusion Detection System Preventing Insider Attack

Recent reports show that the loss from the malicious intrusion by insiders is more serious than by outsiders. Despite that the various attacks are occurred by insiders and outsiders, most work has been focused on the intrusion detection against outsider attacks. In this paper, we improve the Wang et al.’s insider predection model [15] and propose the combined model with access control for the e...

متن کامل

Collaborative Intrusion Detection Networks and Insider Attacks

Cyber intrusion is becoming an increasingly global and urgent problem. Intrusion Detection Systems (IDSs) are deployed to identify intrusions and mitigate their damage. A stand alone IDS does not have complete information or knowledge to detect intrusions. A Collaborative Intrusion Detection Network (CIDN) consists in a set of cooperating IDSs which use collective knowledge and experience to ac...

متن کامل

A Survey of Intrusion Detection Schemes in Wireless Sensor Networks

Wireless Sensor Networks (WSNs) are currently used in many application areas including military applications, health related applications, control and tracking applications and environment and habitat monitoring applications. The harsh and unattended deployment of these networks along with their resource restrictions makes their security issue very important. Prevention-based security approache...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Inf. Sec. Techn. Report

دوره 13  شماره 

صفحات  -

تاریخ انتشار 2008