2010
DOI: 10.1007/s10796-010-9268-7
|View full text |Cite
|
Sign up to set email alerts
|

Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise

Abstract: Insider attacks are often subtle and slow, or preceded by behavioral indicators such as organizational rulebreaking which provide the potential for early warning of malicious intent; both these cases pose the problem of identifying attacks from limited evidence contained within a large volume of event data collected from multiple sources over a long period. This paper proposes a scalable solution to this problem by maintaining long-term estimates that individuals or nodes are attackers, rather than retaining e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(18 citation statements)
references
References 9 publications
0
18
0
Order By: Relevance
“…Now, at any given time, an organization needs to focus on two fronts to mitigate unknown attacks. It is possible to study patterns and attributes of certain or all events but if the end focus is not determine, it could lead in missing exploits unless IDS detected it as being an anomaly [23]. Some research refer to this dilemma as the "Dark Side of IT" where stopping an employee that has access to sensitive information is difficult if he/she wants to sell to competitors but implementing strong security policy is critical in such situation [73].…”
Section: Applied Methodsmentioning
confidence: 99%
“…Now, at any given time, an organization needs to focus on two fronts to mitigate unknown attacks. It is possible to study patterns and attributes of certain or all events but if the end focus is not determine, it could lead in missing exploits unless IDS detected it as being an anomaly [23]. Some research refer to this dilemma as the "Dark Side of IT" where stopping an employee that has access to sensitive information is difficult if he/she wants to sell to competitors but implementing strong security policy is critical in such situation [73].…”
Section: Applied Methodsmentioning
confidence: 99%
“…However it is not a methodological weakness of this approach, and only due to a practical constraint accessing a sufficiently large known malicious (heartbleed) dataset. In such a situation, if the historical rate of occurrences of certain attacks is known, it can be used to estimate the likelihood that certain events derive from such attacks or it may be sufficient to quantify these frequencies by an expert in a similar way to estimating risk likelihoods to an accuracy of an order of magnitude [22].…”
Section: Discussionmentioning
confidence: 99%
“…Such uncertainty needs to be acknowledged [21]. Using Bayesian technique and its variants for intrusions detection can be found in [22], [23]. The relevance of information fusion for network security monitoring has been widely discussed [24].…”
Section: Related Workmentioning
confidence: 99%
“…Insiders are usually employees, contractors, consultants or personnel from thirdparty service providers who would have been granted legitimate access to IT systems [1]. An insider threat could arise from anyone in these categories because these people have knowledge of the internal IT system and sometimes of the security controls protecting it [2] [3].…”
Section: Segregation Of Duties and Insider Threatsmentioning
confidence: 99%