A framework for role-based monitoring of insider misuse

被引:0
|
作者
Phyo, AH [1 ]
Furnell, SM [1 ]
Portilla, F [1 ]
机构
[1] Univ Plymouth, Sch Comp Commun & Elect, Network Res Grp, Plymouth PL4 8AA, Devon, England
来源
INFORMATION SECURITY MANAGEMENT, EDUCATION AND PRIVACY | 2004年 / 148卷
关键词
misuse detection; insider misuse; intrusion detection; role-based monitoring;
D O I
10.1007/1-4020-8145-6_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many security incidents involve legitimate users who misuse their existing privileges, such that they have the system-level right to perform an action, but not the moral right to do so. Current Intrusion Detection Systems (IDSs) are ineffective in this context, because they do not have knowledge of user responsibilities, normal working scope of a user for a relevant position, or the separation of duties that should be enforced. This paper considers examples of the forms that misuse may take within typical applications, and then outlines a novel framework to address the problem of insider misuse monitoring. The approach argues that users with similar roles and responsibilities will exhibit similar behaviour within the system, enabling any activity that deviates from the normal profile to be flagged for further examination. The system utilises established access control principles for defining user roles, and the relationships between them, and proposes a misuse monitoring agent that will police application-level activities for signs of unauthorised behaviour.
引用
收藏
页码:51 / 65
页数:15
相关论文
共 50 条
  • [41] Enabling role-based web access control using a declarative logical framework
    Chamizo, Javier
    Mencke, Myriam
    Gomez, Juan Miguel
    Alor-Hernandez, Giner
    2008 IEEE 24TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING WORKSHOP, VOLS 1 AND 2, 2008, : 390 - +
  • [42] Role-based Automatic Programming Framework for Interworking a Drone and Wireless Sensor Networks
    Min, Hong
    Jung, Jinman
    Kim, Seoyeon
    Kim, Bongjae
    Heo, Junyoung
    33RD ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2018, : 1853 - 1856
  • [43] A framework for role-based specification and evaluation of awareness support in synchronous collaborative applications
    Drury, J
    Williams, MG
    WET ICE 2002: ELEVENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2002, : 12 - 17
  • [44] A tool for role-based chatting
    Zhu, Haibin
    Alkins, Rob
    2007 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-8, 2007, : 2505 - 2510
  • [45] Role-based authentication protocol
    Yao, Hongyan
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (04) : 460 - 470
  • [46] Role-Based Graph Embeddings
    Ahmed, Nesreen K.
    Rossi, Ryan A.
    Lee, John Boaz
    Willke, Theodore L.
    Zhou, Rong
    Kong, Xiangnan
    Eldardiry, Hoda
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2022, 34 (05) : 2401 - 2415
  • [47] Role-based access control
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (02): : 198 - 200
  • [48] Role-based infrastructures for agents
    Cabri, G
    EIGHTH IEEE WORKSHOP ON FUTURE TRENDS OF DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2001, : 210 - 214
  • [49] Role-Based Systems are Autonomic
    Zhu, Haibin
    PROCEEDINGS OF THE SEVENTH IEEE INTERNATIONAL CONFERENCE ON COGNITIVE INFORMATICS, 2008, : 144 - 152
  • [50] Delegation in a role-based organization
    Pacheco, O
    Santos, F
    DEONTIC LOGIC IN COMPUTER SCIENCE, PROCEEDINGS, 2004, 3065 : 209 - 227