首页> 外文期刊>ACM Computing Surveys >Insight Into Insiders and IT: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Counter-measures
【24h】

Insight Into Insiders and IT: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Counter-measures

机译:深入了解内部人和IT:对内幕威胁分类,分析,建模和反措施的调查

获取原文
获取原文并翻译 | 示例

摘要

Insider threats are one of today's most challenging cybersecurity issues that are not well addressed by commonly employed security solutions. In this work, we propose structural taxonomy and novel categorization of research that contribute to the organization and disambiguation of insider threat incidents and the defense solutions used against them. The objective of our categorization is to systematize knowledge in insider threat research while using an existing grounded theory method for rigorous literature review. The proposed categorization depicts the workflow among particular categories that include incidents and datasets, analysis of incidents, simulations, and defense solutions. Special attention is paid to the definitions and taxonomies of the insider threat; we present a structural taxonomy of insider threat incidents that is based on existing taxonomies and the 5W1H questions of the information gathering problem. Our survey will enhance researchers' efforts in the domain of insider threat because it provides (1) a novel structural taxonomy that contributes to orthogonal classification of incidents and defining the scope of defense solutions employed against them, (2) an overview on publicly available datasets that can be used to test new detection solutions against other works, (3) references of existing case studies and frameworks modeling insiders' behaviors for the purpose of reviewing defense solutions or extending their coverage, and (4) a discussion of existing trends and further research directions that can be used for reasoning in the insider threat domain.
机译:Insider威胁是当今最具挑战性的网络安全问题之一,这些问题并不通过普遍采用的安全解决方案解决。在这项工作中,我们提出了结构分类和新的研究分类,这有助于组织和歧义内幕威胁事件以及对抗它们的防御解决方案。我们的分类的目标是在利用现有的基础理论方法中对内部威胁研究系统施加知识,以便严谨的文献综述。所提出的分类描述了包括事件和数据集的特定类别的工作流程,事件分析,模拟和防御解决方案。特别注意内部威胁的定义和分类;我们提出了内部威胁事件的结构分类,该事件是基于现有分类和信息收集问题的5W1H问题。我们的调查将提高研究人员在内部威胁领域的努力,因为它提供了一种新的结构分类,有助于对其正交的事件进行正交分类,并定义对他们所雇用的防御解决方案的范围,(2)概述了公开的数据集可用于测试对其他作品的新检测解决方案,(3)现有案例研究和框架建模行业的行为的参考,以审查防御解决方案或延长其覆盖范围,以及(4)对现有趋势的讨论和进一步讨论在内幕威胁领域中可以用于推理的研究方向。

著录项

  • 来源
    《ACM Computing Surveys》 |2020年第2期|30.1-30.40|共40页
  • 作者单位

    STE SUTD Cyber Secur Lab Singapore Singapore|Brno Univ Technol Fac Informat Technol Bozetechova 1-2 Brno 61266 Czech Republic;

    STE SUTD Cyber Secur Lab Singapore Singapore|Singapore Univ Technol & Design STE SUTD Cyber Secur Lab 8 Somapah Rd Singapore 487372 Singapore;

    STE SUTD Cyber Secur Lab Singapore Singapore|Singapore Univ Technol & Design STE SUTD Cyber Secur Lab 8 Somapah Rd Singapore 487372 Singapore;

    Ben Gurion Univ Negev Beer Sheva Israel|Singapore Univ Technol & Design STE SUTD Cyber Secur Lab 8 Somapah Rd Singapore 487372 Singapore;

    STE SUTD Cyber Secur Lab Singapore Singapore|Cyxtera Technol Coral Gables FL USA|Cra 13A 98-75 Bogota Colombia;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Insider threat; malicious insider threat; unintentional insider threat; masqueraders; traitors; grounded theory for rigorous literature review; 5W1H questions;

    机译:内幕威胁;恶意内部威胁;无意的内幕威胁;伪装者;叛徒;接地的严谨文献综述理论;5W1H的问题;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号