Maintaining Defender's Reputation in Anomaly Detection Against Insider Attacks

被引:26
|
作者
Zhang, Nan [1 ]
Yu, Wei [2 ]
Fu, Xinwen [3 ]
Das, Sajal K. [4 ]
机构
[1] George Washington Univ, Dept Comp Sci, Washington, DC 20052 USA
[2] Towson Univ, Dept Comp & Informat Sci, Towson, MD 21252 USA
[3] Univ Massachusetts, Dept Comp Sci, Lowell, MA 01854 USA
[4] Univ Texas Arlington, Dept Comp Sci & Engn, Arlington, TX 76019 USA
来源
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS | 2010年 / 40卷 / 03期
基金
美国国家科学基金会;
关键词
Anomaly detection; game theory; insider attack; SECURITY;
D O I
10.1109/TSMCB.2009.2033564
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We address issues related to establishing a defender's reputation in anomaly detection against two types of attackers: 1) smart insiders, who learn from historic attacks and adapt their strategies to avoid detection/punishment, and 2) naive attackers, who blindly launch their attacks without knowledge of the history. In this paper, we propose two novel algorithms for reputation establishment-one for systems solely consisting of smart insiders and the other for systems in which both smart insiders and naive attackers are present. The theoretical analysis and performance evaluation show that our reputation-establishment algorithms can significantly improve the performance of anomaly detection against insider attacks in terms of the tradeoff between detection and false positives.
引用
收藏
页码:597 / 611
页数:15
相关论文
共 50 条
  • [21] An Approach for Poisoning Attacks against RNN-Based Cyber Anomaly Detection
    Xu, Jinghui
    Wen, Yu
    Yang, Chun
    Meng, Dan
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1680 - 1687
  • [22] Black-box attacks against log anomaly detection with adversarial examples
    Lu, Siyang
    Wang, Mingquan
    Wang, Dongdong
    Wei, Xiang
    Xiao, Sizhe
    Wang, Zhiwei
    Han, Ningning
    Wang, Liqiang
    INFORMATION SCIENCES, 2023, 619 : 249 - 262
  • [23] A Reputation-Based Coalition Game to Prevent Smart Insider Jamming Attacks in MANETs
    Oyedare, Taiwo
    Al Sharah, Ashraf
    Shetty, Sachin
    WIRED/WIRELESS INTERNET COMMUNICATIONS, WWIC 2016, 2016, 9674 : 241 - 253
  • [24] Anomaly Detection for Insider Threats Using Unsupervised Ensembles
    Le, Duc C.
    Zincir-Heywood, Nur
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (02): : 1152 - 1164
  • [25] PREFENDER: A Prefetching Defender against Cache Side Channel Attacks as A Pretender
    Li, Luyi
    Huang, Jiayi
    Feng, Lang
    Wang, Zhongfeng
    PROCEEDINGS OF THE 2022 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2022), 2022, : 1509 - 1514
  • [26] FINDER: A Simple and Effective Defender against Unnoticeable Graph Injection Attacks
    Su, Linlin
    Wang, Jinyan
    Gan, Zeming
    Li, Xianxian
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 125 - 132
  • [27] Detection of Insider Attacks in Distributed Projected Subgradient Algorithms
    Wu, Sissi Xiaoxiao
    Li, Gangqiang
    Zhang, Shengli
    Lin, Xiaohui
    IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2021, 7 (04) : 1099 - 1111
  • [28] An unsupervised strategy for defending against multifarious reputation attacks
    Xin Wang
    Shu-juan Ji
    Yong-quan Liang
    Ho-fung Leung
    Dickson K.W. Chiu
    Applied Intelligence, 2019, 49 : 4189 - 4210
  • [29] An unsupervised strategy for defending against multifarious reputation attacks
    Wang, Xin
    Ji, Shu-juan
    Liang, Yong-quan
    Leung, Ho-fung
    Chiu, Dickson K. W.
    APPLIED INTELLIGENCE, 2019, 49 (12) : 4189 - 4210
  • [30] Fortifying TripAdvisor against Reputation-System Attacks
    Buccafurri, Francesco
    Lax, Gianluca
    Nicolazzo, Serena
    Nocera, Antonino
    2014 WORLD CONGRESS ON INTERNET SECURITY (WORLDCIS), 2014, : 20 - 21