Insider Threat Mitigation Using Moving Target Defense and Deception

被引:4
|
作者
Takabi, Hassan [1 ]
Jafarian, J. Haadi [2 ]
机构
[1] Univ North Texas, Dept Comp Sci & Engn, Denton, TX 76203 USA
[2] Univ Colorado, Dept Comp Sci & Engn, Denver, CO USA
关键词
Insider Threat; Moving Target Defense; Deception; Attribute-based Access Control;
D O I
10.1145/3139923.3139935
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The insider threat has been subject of extensive study and many approaches from technical perspective to behavioral perspective and psychological perspective have been proposed to detect or mitigate it. However, it still remains one of the most difficult security issues to combat. In this paper, we propose an ongoing effort on developing a systematic framework to address insider threat challenges by laying a scientific foundation for defensive deception, leveraging moving target defense (MTD), an emerging technique for providing proactive security measurements, and integrating deception and MTD into attribute-based access control (ABAC).
引用
收藏
页码:93 / 96
页数:4
相关论文
共 50 条
  • [21] Insider threat mitigation: preventing unauthorized knowledge acquisition
    Qussai Yaseen
    Brajendra Panda
    International Journal of Information Security, 2012, 11 : 269 - 280
  • [22] Using Dynamic Addressing for a Moving Target Defense
    Groat, Stephen
    Dunlop, Matthew
    Marchany, Randy
    Tront, Joseph
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2011, : 84 - 91
  • [23] VISTA: An inclusive insider threat taxonomy, with mitigation strategies
    Renaud, Karen
    Warkentin, Merrill
    Pogrebna, Ganna
    van der Schyff, Karl
    INFORMATION & MANAGEMENT, 2024, 61 (01)
  • [24] Insider Threat Defense Strategies: Survey and Knowledge Integration
    Song, Chengyu
    Zhang, Jingjing
    Ma, Linru
    Hu, Xinxin
    Zheng, Jianming
    Yang, Lin
    KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT, PT V, KSEM 2024, 2024, 14888 : 106 - 122
  • [25] wAdvMTD: A Mitigation to White-box Adversarial Examples Using Heterogeneous Models and Moving Target Defense
    Li, Yuanpei
    Zhou, Qinglei
    Li, Shibo
    Li, Bin
    2023 3RD ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS TECHNOLOGY AND COMPUTER SCIENCE, ACCTCS, 2023, : 592 - 597
  • [26] A Software-Defined Approach for Mitigating Insider and External Threats via Moving Target Defense
    d'Ambrosio, Nicola
    Melluso, Emma
    Perrone, Gaetano
    Romano, Simon Pietro
    2023 IEEE CONFERENCE ON NETWORK FUNCTION VIRTUALIZATION AND SOFTWARE DEFINED NETWORKS, NFV-SDN, 2023, : 213 - 219
  • [27] Secure Cyber Deception Architecture and Decoy Injection to Mitigate the Insider Threat
    Park, Kyungmin
    Woo, Samuel
    Moon, Daesung
    Choi, Hoon
    SYMMETRY-BASEL, 2018, 10 (01):
  • [28] Proactive defense mechanism: Enhancing IoT security through diversity-based moving target defense and cyber deception
    Rehman, Zubaida
    Gondal, Iqbal
    Ge, Mengmeng
    Dong, Hai
    Gregory, Mark
    Tari, Zahir
    COMPUTERS & SECURITY, 2024, 139
  • [29] An Investigation of Insider Threat Mitigation Based on EEG Signal Classification
    Kim, Jung Hwan
    Kim, Chul Min
    Yim, Man-Sung
    SENSORS, 2020, 20 (21) : 1 - 17
  • [30] Unintentional Insider Threat: Contributing Factors, Observables, and Mitigation StrategiesAC
    Greitzer, Frank L.
    Strozer, Jeremy
    Cohen, Sholom
    Bergey, John
    Cowley, Jennifer
    Moore, Andrew
    Mundie, David
    2014 47TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2014, : 2025 - 2034