Insider Threat Mitigation Using Moving Target Defense and Deception

被引:4
|
作者
Takabi, Hassan [1 ]
Jafarian, J. Haadi [2 ]
机构
[1] Univ North Texas, Dept Comp Sci & Engn, Denton, TX 76203 USA
[2] Univ Colorado, Dept Comp Sci & Engn, Denver, CO USA
关键词
Insider Threat; Moving Target Defense; Deception; Attribute-based Access Control;
D O I
10.1145/3139923.3139935
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The insider threat has been subject of extensive study and many approaches from technical perspective to behavioral perspective and psychological perspective have been proposed to detect or mitigate it. However, it still remains one of the most difficult security issues to combat. In this paper, we propose an ongoing effort on developing a systematic framework to address insider threat challenges by laying a scientific foundation for defensive deception, leveraging moving target defense (MTD), an emerging technique for providing proactive security measurements, and integrating deception and MTD into attribute-based access control (ABAC).
引用
收藏
页码:93 / 96
页数:4
相关论文
共 50 条
  • [31] Preventative directions for insider threat mitigation via access control
    Sinclair, Sara
    Smith, Sean W.
    INSIDER ATTACK AND CYBER SECURITY: BEYOND THE HACKER, 2008, 39 : 165 - 193
  • [32] A Framework for Insider Collusion Threat Prediction and Mitigation in Relational Databases
    Yaseen, Qussai
    Alabdulrazzaq, Aman
    Albalas, Firas
    2019 IEEE 9TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2019, : 721 - 727
  • [33] DDoS Attack Isolation using Moving Target Defense
    Department, Kansal
    Dave, Mayank
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2017, : 511 - 514
  • [34] Ransomware protection using the moving target defense perspective
    Lee, Suhyeon
    Kim, Huy Kang
    Kim, Kyounggon
    COMPUTERS & ELECTRICAL ENGINEERING, 2019, 78 : 288 - 299
  • [35] Defense for Advanced Persistent Threat with Inadvertent and Malicious Insider Threats
    Chen, Ziqin
    Chen, Guanpu
    Hong, Yiguang
    UNMANNED SYSTEMS, 2024, 12 (02) : 341 - 358
  • [36] Toward Proactive and Efficient DDoS Mitigation in IIoT Systems: A Moving Target Defense Approach
    Zhou, Yuyang
    Cheng, Guang
    Zhao, Yuyu
    Chen, Zihan
    Jiang, Shanqing
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (04) : 2734 - 2744
  • [37] Moving Target Defense based on Switched Supervisory Control: A New Technique for Mitigating Sensor Deception Attacks
    Meira-Goes, Romulo
    Lafortune, Stephane
    IFAC PAPERSONLINE, 2020, 53 (04): : 317 - 323
  • [38] A Physical Overlay Framework for Insider Threat Mitigation of Power System Devices
    Formby, David
    Jung, Sang Shin
    Walters, Seth
    Beyah, Raheem
    2014 IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM), 2014, : 970 - 975
  • [39] Survival analysis for insider threat Detecting insider threat incidents using survival analysis techniques
    Alhajjar, Elie
    Bradley, Taylor
    COMPUTATIONAL AND MATHEMATICAL ORGANIZATION THEORY, 2022, 28 (04) : 335 - 351
  • [40] Ransomware prevention using moving target defense based approach
    Khan, Muhammad Mubashir
    Hyder, Muhammad Faraz
    Khan, Shariq Mahmood
    Arshad, Junaid
    Khan, Muhammad M.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (07):