A framework for role-based monitoring of insider misuse

被引:0
|
作者
Phyo, AH [1 ]
Furnell, SM [1 ]
Portilla, F [1 ]
机构
[1] Univ Plymouth, Sch Comp Commun & Elect, Network Res Grp, Plymouth PL4 8AA, Devon, England
关键词
misuse detection; insider misuse; intrusion detection; role-based monitoring;
D O I
10.1007/1-4020-8145-6_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many security incidents involve legitimate users who misuse their existing privileges, such that they have the system-level right to perform an action, but not the moral right to do so. Current Intrusion Detection Systems (IDSs) are ineffective in this context, because they do not have knowledge of user responsibilities, normal working scope of a user for a relevant position, or the separation of duties that should be enforced. This paper considers examples of the forms that misuse may take within typical applications, and then outlines a novel framework to address the problem of insider misuse monitoring. The approach argues that users with similar roles and responsibilities will exhibit similar behaviour within the system, enabling any activity that deviates from the normal profile to be flagged for further examination. The system utilises established access control principles for defining user roles, and the relationships between them, and proposes a misuse monitoring agent that will police application-level activities for signs of unauthorised behaviour.
引用
收藏
页码:51 / 65
页数:15
相关论文
共 50 条
  • [1] A conceptual framework for monitoring insider misuse
    Phyo, AH
    Furnell, S
    EUROMEDIA '2004: 10TH ANNUAL EUROMEDIA CONFERENCE, 2004, : 90 - 95
  • [2] Composite role-based monitoring (CRBM) for countering insider threats
    Park, JS
    Ho, SM
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2004, 3073 : 201 - 213
  • [3] Framework for role-based delegation models
    Barka, E
    Sandhu, R
    16TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2000, : 168 - 176
  • [4] Role-based Templates for Cloud Monitoring
    The An Binh Nguyen
    Siebenhaar, Melanie
    Hans, Ronny
    Steinmetz, Ralf
    2014 IEEE/ACM 7TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC), 2014, : 242 - 250
  • [5] A Role-based Secure Group Communication Framework
    Bian, Jiang
    Topaloglu, Umit
    Seker, Remzi
    Bayrak, Coskun
    Chiang, Chia-Chu
    2008 IEEE INTERNATIONAL CONFERENCE ON SYSTEM OF SYSTEMS ENGINEERING (SOSE), 2008, : 111 - 116
  • [6] Extended role-based sensor management framework
    Kim, S
    Moon, M
    Yeom, K
    8TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1-3: TOWARD THE ERA OF UBIQUITOUS NETWORKS AND SOCIETIES, 2006, : U175 - U180
  • [7] Contextual and Relational Role-Based Modeling Framework
    Kuehn, Thomas
    Werner, Christopher
    Schoen, Hendrik
    Zhao Zhenxi
    Assmann, Uwe
    2019 45TH EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS (SEAA 2019), 2019, : 442 - 449
  • [8] TOWARDS A USER AND ROLE-BASED BEHAVIOR ANALYSIS METHOD FOR INSIDER THREAT DETECTION
    Lv, Qiujian
    Wang, Yan
    Wang, Leigi
    Wang, Dan
    PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT (IEEE IC-NIDC), 2018, : 6 - 10
  • [9] Role-based profile analysis for scalable and accurate insider-anomaly detection
    Park, Joon S.
    Giordano, Joseph
    2006 IEEE INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE, VOLS 1 AND 2, 2006, : 463 - +
  • [10] Role-based Log Analysis Applying Deep Learning for Insider Threat Detection
    Zhang, Dongxue
    Zheng, Yang
    Wen, Yu
    Xu, Yujue
    Wang, Jingchuo
    Yu, Yang
    Meng, Dan
    PROCEEDINGS OF THE 1ST WORKSHOP ON SECURITY-ORIENTED DESIGNS OF COMPUTER ARCHITECTURES AND PROCESSORS (SECARCH'18), 2018, : 18 - 20