Detecting Insider Theft of Trade Secrets

被引:30
作者
Caputo, Deanna D. [1 ]
Stephens, Gregory D. [1 ]
Maloof, Marcus A. [2 ]
机构
[1] Mitre Corp, Mclean, VA USA
[2] Georgetown Univ, Dept Comp Sci, Washington, DC 20057 USA
关键词
Computer misuse; Computer security; Elicit; Exploit Latent Information to Counter Insider Threats; Insider threats; MITRE;
D O I
10.1109/MSP.2009.110
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Trusted insiders who misuse their privileges to gather and steal sensitive information represent a potent threat to businesses. Applying access controls to protect sensitive information can reduce the threat but has significant limitations. Even if access controls are set properly, they don't protect against rogue employees who legitimately need to access sensitive information. Since 2002, researchers at MITRE have investigated methods for detecting insiders who misuse their legitimate access to steal information. A three-year, internally funded research effort developed and evaluated a research prototype of a system called Elicit (Exploit Latent Information to Counter Insider Threats) to help analysts identify insider threats. Work on Elicit prompted a team of engineers and social scientists to experimentally explore how malicious insiders use information differently from a benign baseline group. This article presents results from the research prototype evaluation, discusses preliminary results from the double-blind study of malicious insiders, and offers some essential aspects for detecting insider threats gleaned from these efforts. © 2009 IEEE.
引用
收藏
页码:14 / 21
页数:8
相关论文
共 9 条
[1]  
BLAIR MM, 2000, LOS ANGELES TIM 1113, pB7
[2]  
Caputo DD, 2008, LECT NOTES COMPUT SC, V5230, P402, DOI 10.1007/978-3-540-87403-4_27
[3]  
Cathey R., 2003, P 12 INT C INF KNOWL, P183
[4]  
GROSS G, 2006, NETWORK WORLD 0605
[5]  
Kowalski E., 2008, US Secret Service and CERT/SEI Insider Threat Study: Illicit cyber activity in the Information Technology and Telecommunications Sector
[6]  
Maloof MA, 2007, LECT NOTES COMPUT SC, V4637, P146
[7]  
MAYBURY M, 2005, P 2005 INT C INT AN
[8]  
Rantala R., 2008, CYBERCRIME BUSINESSE
[9]  
Sicilliano C. L. B., 1995, P IEEE ACM SUP 95 C, P56, DOI [10.1109/SUPERC.1995.241777, DOI 10.1109/SUPERC.1995.241777]