Insider Threat Mitigation Using Moving Target Defense and Deception

被引:4
|
作者
Takabi, Hassan [1 ]
Jafarian, J. Haadi [2 ]
机构
[1] Univ North Texas, Dept Comp Sci & Engn, Denton, TX 76203 USA
[2] Univ Colorado, Dept Comp Sci & Engn, Denver, CO USA
关键词
Insider Threat; Moving Target Defense; Deception; Attribute-based Access Control;
D O I
10.1145/3139923.3139935
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The insider threat has been subject of extensive study and many approaches from technical perspective to behavioral perspective and psychological perspective have been proposed to detect or mitigate it. However, it still remains one of the most difficult security issues to combat. In this paper, we propose an ongoing effort on developing a systematic framework to address insider threat challenges by laying a scientific foundation for defensive deception, leveraging moving target defense (MTD), an emerging technique for providing proactive security measurements, and integrating deception and MTD into attribute-based access control (ABAC).
引用
收藏
页码:93 / 96
页数:4
相关论文
共 50 条
  • [1] Duplicity Games for Deception Design With an Application to Insider Threat Mitigation
    Huang, Linan
    Zhu, Quanyan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 4843 - 4856
  • [2] Web Deception towards Moving Target Defense
    Djamaluddin, Basirudin
    Alnazeer, Ahmed
    Azzedin, Farag
    2018 52ND ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2018, : 249 - 253
  • [3] Computer Network Deception as a Moving Target Defense
    Urias, Vincent E.
    Stout, William M. S.
    Loverro, Caleb
    49TH ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2015, : 101 - 106
  • [4] Mitigation of DDoS Attack Using Moving Target Defense in SDN
    Swami, Rochak
    Dave, Mayank
    Ranga, Virender
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 131 (04) : 2429 - 2443
  • [5] Mitigation of DDoS Attack Using Moving Target Defense in SDN
    Rochak Swami
    Mayank Dave
    Virender Ranga
    Wireless Personal Communications, 2023, 131 : 2429 - 2443
  • [6] Evaluating Deception and Moving Target Defense with Network Attack Simulation
    Reti, Daniel
    Elzer, Karina
    Fraunholz, Daniel
    Schneider, Daniel
    Schotten, Hans Dieter
    PROCEEDINGS OF THE 9TH ACM WORKSHOP ON MOVING TARGET DEFENSE, MTD 2022, 2022, : 45 - 53
  • [7] Towards Countering the Insider Reconnaissance Using a Combination of Shuffling and Diversity Moving Target Defense Techniques
    Hyder, Muhammad Faraz
    Waseemullah
    Farooq, Muhammad Umer
    ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2021, 11 (06) : 7745 - 7749
  • [8] Analysis of VM Migration Scheduling as Moving Target Defense against insider attacks
    Torquato, Matheus
    Maciel, Paulo
    Vieira, Marco
    36TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2021, 2021, : 194 - 202
  • [9] Performance Analysis of an Insider Threat Mitigation Model
    Althebyan, Qutaibah
    Panda, Brajendra
    2008 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT, VOLS 1 AND 2, 2008, : 719 - 725
  • [10] Towards a New Insider Threat Mitigation Framework
    Chaipa, Sarathiel
    Ketcha Ngassam, Ernest
    Singh, Shawren
    2023 IST-AFRICA CONFERENCE, IST-AFRICA, 2023,