2009 IEEE Conference on Technologies for Homeland Security 2009
DOI: 10.1109/ths.2009.5168063
|View full text |Cite
|
Sign up to set email alerts
|

AZALIA: an A to Z assessment of the likelihood of insider attack

Abstract: Abstract-The insider threat problem is increasing, both in terms of the number of incidents and their financial impact. To date, solutions have been developed to detect specific instances of insider attacks (e.g., fraud detection) and therefore use very limited information for input. In this paper we describe an architecture for an enterprise-level solution that incorporates data from multiple sources. The unique aspects of this solution include the prioritization of resources based on the business value of th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
8
0

Year Published

2010
2010
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(16 citation statements)
references
References 11 publications
0
8
0
Order By: Relevance
“…Other than issues discussed above, there is a likelihood of insider attack that can be a result of many possible reasons based on human complex nature [60]. Carelessness, in protecting passwords, passphrases, or machine's unrestricted access to all may also contribute a lot in security breach [61][62].…”
Section: Other Security Issues In Protogenimentioning
confidence: 99%
“…Other than issues discussed above, there is a likelihood of insider attack that can be a result of many possible reasons based on human complex nature [60]. Carelessness, in protecting passwords, passphrases, or machine's unrestricted access to all may also contribute a lot in security breach [61][62].…”
Section: Other Security Issues In Protogenimentioning
confidence: 99%
“…Although such tools are still in their infancy, the empirical results show several signs of improvement. For instance, Bishop et al, in [3] introduced an architecture for a tool that attempts to identify certain behavioural changes that may be alarming. Others [15] have suggested the use of Intrusion Detection Systems (IDS) to identify the deviations from "normal" usage patterns by users.…”
Section: Insider Typesmentioning
confidence: 99%
“…Authorisation decisions within these approaches are based on a security policy, that constitutes a set of rules binding access rights to users on the basis of need and assumed unlikelihood of misuse. The main shortcoming of the current policy-based approaches is their use of static criteria to determine a dynamic phenomena: future needs and future users' behaviour 3 .…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…can capture users' online presence as well. Several other researchers identified various psychological factors which have direct implications on insider threat problem [4] [8] [15].…”
mentioning
confidence: 99%