Guest Editorial: Insider Threat Solutions - Moving from Concept to Reality

نویسندگان

  • Jason R. C. Nurse
  • Elisa Bertino
چکیده

As society has embraced technology and systems to promote services, trade and ubiquitous communication, it has also inadvertently exposed itself to a plethora of security risks. One of the most significant of these risks is that of insider threat, where privileged insiders (be they employees or trusted thirdparties) within an enterprise, intentionally or inadvertently cause harm their organisations [1]. While the topic of insider threat has been examined and researched for decades [2, 3], the problem still persists, and some would even argue that it is becoming worse [4]. Could this be the result of a disconnect between approaches and solutions being researched and those that are (or can be) actually implemented? In this special issue titled, “Insider Threat Solutions: Moving from Concept to Reality”, we focus on novel systems to tackle insider threat which also provide a clear path for how they can be deployed in organisations. Our aim is to help bridge the gap between research concepts and the reality that businesses face day-to-day as they seek to prevent, detect and respond to insider attacks. This special issue includes four papers that outline novel and practical approaches to addressing the insider threat challenge. They focus on various solution perspectives, from multi-policy access control systems to formal approaches for network security policy validation. These best papers are selected from articles submitted to, and presented in, the 8th International Workshop on Managing Insider Security Threats (MIST) [3] which was held in Conjunction with ACM SIGSAC Conference on Computer and Communications Security 2016 at the Hofburg Palace, Vienna, Austria, on October 24-28, 2016. The first article, “Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems” [5], discusses an implementation of the Next Generation Access Control (NGAC) standard from the American National Standards Institute (ANSI). The main contributions of their research are: (a) being the first ever study to demonstrate the scalability of the NGAC multi-policy access control system; (b) the creation of a novel visualization approach to enable review of user object access on NGAC systems; and (c) the definition of linear time algorithms for performing access control decisions and review of user access rights. In the second article, “Formalising Policies for Insider-threat Detection: A Tripwire Grammar” [6], the authors describe their recent research into how they intend to enhance anomaly detection systems by capturing actions of concern. They view concerning actions as something that they can design and implement tripwires within a system to detect. The aim, therefore, being to orchestrate these tripwires in conjunction with an anomaly detection system to better detect insider attacks. Overall, their work seeks to provide a single framework for unambiguously capturing tripwires, alongside a library of existing ones in use. Therefore, tripwires may be used to map experiences regardless of the heterogeneity of the security tools and practices deployed. The third article, “Insider Threats and Auctions: Formalization, Mechanized Proof, and Code Generation” [7], applies machine assisted formal methods to explore insider threats for auctions. The contributions of the paper are: (a) a formalization of the cocaine protocol using Isabelle’s inductive approach including the formalization and proof of the absence of the sweetheart deal and the impossibility of

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Guest Editorial: Emerging Trends in Research for Insider Threat Detection

The insider threat is one of mankind’s most enduring security challenges. For as long as people have placed trust in one other, they have faced the risk of that trust being violated. Historically, consequences of insider attacks included compromised organizational security, financial loss, and risks to human health and safety. Prior to the information age, attacks mainly targeted tangible asset...

متن کامل

A Critical Reflection on the Threat from Human Insiders - Its Nature, Industry Perceptions, and Detection Approaches

Organisations today operate in a world fraught with threats, including “script kiddies”, hackers, hacktivists and advanced persistent threats. Although these threats can be harmful to an enterprise, a potentially more devastating and anecdotally more likely threat is that of the malicious insider. These trusted individuals have access to valuable company systems and data, and are well placed to...

متن کامل

Outlier Detection in Random Subspaces over Data Streams: An Approach for Insider Threat Detection

Insider threat detection is an emergent concern for industries and governments due to the growing number of attacks in recent years. Several Machine Learning (ML) approaches have been developed to detect insider threats, however, they still suffer from a high number of false alarms. None of those approaches addressed the insider threat problem from the perspective of stream mining data where a ...

متن کامل

Assessing insider threats to information security using technical, behavioural and organisational measures

TheUKgovernment tookabruising in theheadlines (Sep 2008) after aHomeOffice contractor lost a USB stick containing unencrypted data on all 84,000 prisoners in England and Wales. As a result, the Home Office terminated the £1.5million contract with themanagement consultancy firm. The world woke up to the largest attempted bank fraud ever when the UK’s National HiTech Crime Unit foiled the world’s...

متن کامل

Towards an insider threat prediction specification language

Purpose This concept paper presents the process of constructing a language tailored to describing insider threat incidents, for the purposes of mitigating threats originating from legitimate users in an IT infrastructure. Various information security surveys indicate that misuse by legitimate (insider) users has serious implications for the health of IT environments. A brief discussion of surve...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • JoWUA

دوره 8  شماره 

صفحات  -

تاریخ انتشار 2017