A Tripwire Grammar for Insider Threat Detection

被引:8
作者
Agrafiotis, Ioannis [1 ]
Erola, Arnau [1 ]
Goldsmith, Michael [1 ]
Creese, Sadie [1 ]
机构
[1] Univ Oxford, Dept Comp Sci, Oxford OX1 2JD, England
来源
MIST'16: PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON MANAGING INSIDER SECURITY THREATS | 2016年
关键词
Insider threat; Tripwire; Security policies; Attack-pattern; Grammar;
D O I
10.1145/2995959.2995971
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The threat from insiders is an ever-growing concern for organisations, and in recent years the harm that insiders pose has been widely demonstrated. This paper describes our recent work into how we might support insider threat detection when actions are taken which can be immediately determined as of concern because they fall into one of two categories: they violate a policy which is specifically crafted to describe behaviours that are highly likely to be of concern if they are exhibited, or they exhibit behaviours which follow a pattern of a known insider threat attack. In particular, we view these concerning actions as something that we can design and implement trip wires within a system to detect. We then orchestrate these tripwires in conjunction with an anomaly detection system and present an approach to formalising tripwires of both categories. Our intention being that by having a single framework for describing them, alongside a library of existing tripwires in use, we can provide the community of practitioners and researchers with the basis to document and evolve this common understanding of tripwires.
引用
收藏
页码:105 / 108
页数:4
相关论文
共 10 条
[1]  
Agrafiotis I, 2015, COMPUT FRAUD SECUR, P9
[2]  
[Anonymous], 2012, C PROTECTION NATL IN
[3]  
Cappelli D. M., 2012, CERT GUID INSIDER TH
[4]  
Crampton J., 2009, P 5 INT WORKSH SEC T
[5]   Invalidating Policies using Structural Information [J].
Kammueller, Florian ;
Probst, Christian W. .
IEEE CS SECURITY AND PRIVACY WORKSHOPS (SPW 2013), 2013, :76-81
[6]  
Legg P. A., 2015, AUTOMATED INSIDER TH
[7]  
Magklaras G, 2010, ADV INFORM SECUR, V49, P219, DOI 10.1007/978-1-4419-7133-3_10
[8]   Understanding Insider Threat: A Framework for Characterising Attacks [J].
Nurse, Jason R. C. ;
Buckley, Oliver ;
Legg, Philip A. ;
Goldsmith, Michael ;
Creese, Sadie ;
Wright, Gordon R. T. ;
Whitty, Monica .
2014 IEEE SECURITY AND PRIVACY WORKSHOPS (SPW 2014), 2014, :214-228
[9]  
Poll H., 2015, VORMETRIC INSIDER TH
[10]  
Taolue Chen, 2015, Human Aspects of Information Security, Privacy and Trust. Third International Conference, HAS 2015, held as part of HCI International 2015. Proceedings: LNCS 9190, P178, DOI 10.1007/978-3-319-20376-8_16