A Detection-Oriented Classification of Insider IT Misuse
نویسندگان
چکیده
Although the problem of insider misuse of IT systems is frequently recognised in the results of computer security surveys, it is less widely accounted for in organisational security practices and available countermeasures. Indeed, the opportunities for insider misuse, by perpetrators with legitimately assigned privileges, are often overlooked until an incident occurs. A possible reason for this is that the problem receives relatively little attention in the commonly recognised classifications of IT-related attackers and intrusions, with most focusing upon attacks and methods involving some form of system penetration and/or unauthorised access. This paper examines the potential forms of insider misuse in more detail, classifying them according to the level within in a target system at which the incidents could be detected. It is considered that such an approach could provide a relevant foundation in terms of subsequent approaches to automate insider misuse detection methods.
منابع مشابه
LUARM – An audit engine for insider misuse detection
'Logging User Actions in Relational Mode' (LUARM) is an open source audit engine for Linux. It provides a near real-time snapshot of a number of user action data such as file access, program execution and network endpoint user activities, all organized in easily searchable relational tables. LUARM attempts to solve two fundamental problems of the insider IT misuse domain. The first concerns the...
متن کاملAn insider misuse threat detection and prediction language
An Insider Misuse Threat Detection and Prediction Language Georgios Vasilios Magklaras BSc (Hons) MPhil Numerous studies indicate that amongst the various types of security threats, the problem of insider misuse of IT systems can have serious consequences for the health of computing infrastructures. Although incidents of external origin are also dangerous, the insider IT misuse problem is diffi...
متن کاملA generic architecture for insider misuse monitoring in IT systems
A Generic Architecture for Insider Misuse Monitoring in I T Systems Aung Htike Phyo BSc (Hons) Intrusion Detection Systems (IDS) have been widely deployed within many organisations' IT nenvorks to delect network penetration attacks by outsiders and privilege escalation attacks by insiders. However, traditional IDS are ineffective for detecting o f abuse o f legitimate privileges by authorised u...
متن کاملThe Insider Misuse Threat Survey: Investigating IT misuse from legitimate users
The majority of computer security methods tend to focus upon the detection and prevention of security incidents of external origin. However, a number of surveys and media reports indicate the dangers of legitimate user misuse of IT resources, a separate category of computer security incidents with serious consequences for the integrity, privacy and availability of computer systems and networks....
متن کاملWeak Models for Insider Threat Detection
This paper describes the design for a content-based approach to detecting insider misuse by an analyst producing reports in an environment supported by a document control system. The approach makes use of Hidden Markov Models to represent stages in the Evidence-Based Intelligence Analysis Process Model (EBIAPM). This approach is seen as a potential application for the Process Query System / Tra...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004