The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2005 International Conference on Dependable Systems and Networks (DSN'05)
DOI: 10.1109/dsn.2005.94
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Theory of Insider Threat Assessment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
68
0

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 89 publications
(68 citation statements)
references
References 12 publications
0
68
0
Order By: Relevance
“…generalize this technique to generate all possible attack paths, thereby generating the entire attack graph [10]. Chinchani et al [3] present a variant of attack graphs called key-challenge graphs to represent insider attacks, and use model-checking to generate all possible insider attacks in a network. Insider attacks have been modeled at the operating system level by Probst et al [4].…”
Section: Functionmentioning
confidence: 99%
See 1 more Smart Citation
“…generalize this technique to generate all possible attack paths, thereby generating the entire attack graph [10]. Chinchani et al [3] present a variant of attack graphs called key-challenge graphs to represent insider attacks, and use model-checking to generate all possible insider attacks in a network. Insider attacks have been modeled at the operating system level by Probst et al [4].…”
Section: Functionmentioning
confidence: 99%
“…Before defending against insider attacks, we need a model for reasoning about insiders. Previous work has modeled insider attacks at the network and operating system (OS) levels using higher-level formalisms such as attack graphs [3] and process calculi [4], However, modeling application-level insider attacks requires 1 analysis o f the application's code as an insider has access to the application and can hence launch attacks on the application's implementation. Higher-level models are too coarse grained to enable reasoning about attacks that can be launched at the application code level.…”
Section: Introductionmentioning
confidence: 99%
“…From the user's point of view, CAGs are more intuitive than attack graphs because they closely resemble the input network topology [5]. Although originally developed for insider threat modeling, CAGs are capable of modeling vulnerability-exploited privilege escalation, similar to attack graphs.…”
Section: Please Use the Following Format When Citing This Chaptermentioning
confidence: 99%
“…Capability acquisition graphs (CAGs) (formerly known as key challenge graphs (KCGs)) have been proposed as a modeling technique for insider threat analysis [4,5]. From the user's point of view, CAGs are more intuitive than attack graphs because they closely resemble the input network topology [5].…”
Section: Please Use the Following Format When Citing This Chaptermentioning
confidence: 99%
See 1 more Smart Citation