A framework for role-based monitoring of insider misuse

被引:0
|
作者
Phyo, AH [1 ]
Furnell, SM [1 ]
Portilla, F [1 ]
机构
[1] Univ Plymouth, Sch Comp Commun & Elect, Network Res Grp, Plymouth PL4 8AA, Devon, England
来源
INFORMATION SECURITY MANAGEMENT, EDUCATION AND PRIVACY | 2004年 / 148卷
关键词
misuse detection; insider misuse; intrusion detection; role-based monitoring;
D O I
10.1007/1-4020-8145-6_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many security incidents involve legitimate users who misuse their existing privileges, such that they have the system-level right to perform an action, but not the moral right to do so. Current Intrusion Detection Systems (IDSs) are ineffective in this context, because they do not have knowledge of user responsibilities, normal working scope of a user for a relevant position, or the separation of duties that should be enforced. This paper considers examples of the forms that misuse may take within typical applications, and then outlines a novel framework to address the problem of insider misuse monitoring. The approach argues that users with similar roles and responsibilities will exhibit similar behaviour within the system, enabling any activity that deviates from the normal profile to be flagged for further examination. The system utilises established access control principles for defining user roles, and the relationships between them, and proposes a misuse monitoring agent that will police application-level activities for signs of unauthorised behaviour.
引用
收藏
页码:51 / 65
页数:15
相关论文
共 50 条
  • [21] A role-based framework for information system self-development
    Roost, M
    Kuusik, R
    Veskioja, T
    REALIGNING RESEARCH AND PRACTICE IN INFORMATION SYSTEMS DEVELOPMENT: THE SOCIAL AND ORGANIZATIONAL PERSPECTIVE, 2001, 66 : 95 - 105
  • [22] Intermediary roles in regulatory programs: Toward a role-based framework
    Kourula, Arno
    Paukku, Markus
    Peterman, Andrew
    Koria, Mikko
    REGULATION & GOVERNANCE, 2019, 13 (02) : 141 - 156
  • [23] A role-based semantic authorization framework for workflow management systems
    Liu, JX
    Chen, HY
    Tang, MD
    CHINESE JOURNAL OF ELECTRONICS, 2006, 15 (01): : 55 - 59
  • [24] A framework for role-based access control in group communication systems
    Nita-Rotaru, C
    Li, N
    PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS, 2004, : 522 - 529
  • [25] A comprehensive modeling framework for role-based access control policies
    Ben Fadhel, Ameni
    Bianculli, Domenico
    Briand, Lionel
    JOURNAL OF SYSTEMS AND SOFTWARE, 2015, 107 : 110 - 126
  • [26] Role-based Bayesian decision framework for autonomous unmanned systems
    PANG Weijian
    MA Xinyi
    LIANG Xueming
    LIU Xiaogang
    DONG Erwa
    Journal of Systems Engineering and Electronics, 2023, 34 (06) : 1397 - 1408
  • [27] Specifying a role-based guide for learning to work with an enterprise framework
    Hasselbring, W
    van den Houdt, R
    SOFTWARE-PRACTICE & EXPERIENCE, 2002, 32 (08): : 833 - 836
  • [28] A generic software framework for role-based Organic Computing systems
    Nafz, Florian
    Ortmeier, Frank
    Seebach, Hella
    Steghoefer, Jan-Philipp
    Reif, Wolfgang
    2009 ICSE WORKSHOP ON SOFTWARE ENGINEERING FOR ADAPTIVE AND SELF-MANAGING SYSTEMS, 2009, : 96 - 105
  • [29] OntoRT: an Ontology Model for Role-based Trust-management Framework
    Liu, Xinxin
    Tang, Shaohua
    Wei, Kai
    INFORMATION TECHNOLOGY FOR MANUFACTURING SYSTEMS II, PTS 1-3, 2011, 58-60 : 2085 - 2090
  • [30] A Role-Based Semantic Framework for Collaborative Socialized Process Model Reconstruction
    Tan, Wenan
    Huang, Li
    Zhao, Lu
    Tang, Shan
    COMPUTER SUPPORTED COOPERATIVE WORK AND SOCIAL COMPUTING, CHINESECSCW 2018, 2019, 917 : 3 - 19