Maintaining Defender's Reputation in Anomaly Detection Against Insider Attacks

被引:26
|
作者
Zhang, Nan [1 ]
Yu, Wei [2 ]
Fu, Xinwen [3 ]
Das, Sajal K. [4 ]
机构
[1] George Washington Univ, Dept Comp Sci, Washington, DC 20052 USA
[2] Towson Univ, Dept Comp & Informat Sci, Towson, MD 21252 USA
[3] Univ Massachusetts, Dept Comp Sci, Lowell, MA 01854 USA
[4] Univ Texas Arlington, Dept Comp Sci & Engn, Arlington, TX 76019 USA
来源
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS | 2010年 / 40卷 / 03期
基金
美国国家科学基金会;
关键词
Anomaly detection; game theory; insider attack; SECURITY;
D O I
10.1109/TSMCB.2009.2033564
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We address issues related to establishing a defender's reputation in anomaly detection against two types of attackers: 1) smart insiders, who learn from historic attacks and adapt their strategies to avoid detection/punishment, and 2) naive attackers, who blindly launch their attacks without knowledge of the history. In this paper, we propose two novel algorithms for reputation establishment-one for systems solely consisting of smart insiders and the other for systems in which both smart insiders and naive attackers are present. The theoretical analysis and performance evaluation show that our reputation-establishment algorithms can significantly improve the performance of anomaly detection against insider attacks in terms of the tradeoff between detection and false positives.
引用
收藏
页码:597 / 611
页数:15
相关论文
共 50 条
  • [31] An Optimal Reputation-based Detection against SSDF Attacks in Industrial Cognitive Radio Network
    Wang, Pujue
    Chen, Cailian
    Zhu, Shanying
    Lyu, Ling
    Zhang, Weidong
    Guan, Xinping
    2017 13TH IEEE INTERNATIONAL CONFERENCE ON CONTROL & AUTOMATION (ICCA), 2017, : 729 - 734
  • [32] Provably secure untraceable electronic cash against insider attacks
    Hanatani, Yoshikazu
    Komano, Yuichi
    Ohta, Kazuo
    Kunihiro, Noboru
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2007, E90A (05) : 980 - 991
  • [33] Enhancing RPL Resilience Against Routing Layer Insider Attacks
    Heurtefeux, Karel
    Erdene-Ochir, Ochirkhand
    Mohsin, Nasreen
    Menouar, Hamid
    2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (IEEE AINA 2015), 2015, : 802 - 807
  • [34] Anomaly Detection with Graph Convolutional Networks for Insider Threat and Fraud Detection
    Jiang, Jianguo
    Chen, Jiuming
    Gu, Tianbo
    Choo, Kim-Kwang Raymond
    Liu, Chao
    Yu, Min
    Huang, Weiqing
    Mohapatra, Prasant
    MILCOM 2019 - 2019 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2019,
  • [35] A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks
    Meng, Weizhi
    Li, Wenjuan
    Xiang, Yang
    Choo, Kim-Kwang Raymond
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 78 : 162 - 169
  • [36] Secure Cloud Maintenance Protecting workloads against insider attacks
    Bleikertz, Soren
    Kurmus, Anil
    Nagy, Zoltan A.
    Schunter, Matthias
    7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,
  • [37] IRIS: A robust information system against insider DoS attacks
    Eikel, M.
    Scheideler, C.
    ACM Transactions on Parallel Computing, 2015, 2 (03)
  • [38] Enhancing Challenge-based Collaborative Intrusion Detection Against Insider Attacks using Spatial Correlation
    Li, Wenjuan
    Meng, Weizhi
    Parra-Arnau, Javier
    Choo, Kim-Kwang Raymond
    2021 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2021,
  • [39] Enhancing challenge-based collaborative intrusion detection networks against insider attacks using blockchain
    Meng, Weizhi
    Li, Wenjuan
    Yang, Laurence T.
    Li, Peng
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 19 (03) : 279 - 290
  • [40] Enhancing challenge-based collaborative intrusion detection networks against insider attacks using blockchain
    Weizhi Meng
    Wenjuan Li
    Laurence T. Yang
    Peng Li
    International Journal of Information Security, 2020, 19 : 279 - 290