首页> 外文期刊>IEEE transactions on dependable and secure computing >G-SIR: An Insider Attack Resilient Geo-Social Access Control Framework
【24h】

G-SIR: An Insider Attack Resilient Geo-Social Access Control Framework

机译:G-SIR:内幕攻击弹性地理社交访问控制框架

获取原文
获取原文并翻译 | 示例

摘要

Insider attacks are among the most dangerous and costly attacks to organizations. These attacks are carried out by individuals who are legitimately authorized to access the system. Preventing insider attacks is a daunting task. The recent proliferation of social media and mobile devices offer new opportunities to collect geo-social information that can help in detecting and deterring insider attacks. In particular, such geo-social information allows us to better understand the context and behavior of users. In this paper, we propose a Geo-Social Insider Threat Resilient Access Control Framework (G-SIR) to deter insider threats by including current and historic geo-social information as part of the access control decision process. We include policy constraints to manage the risks of colluding communities, proximity threats, and suspicious users while leveraging the presence of users around the requester to make an access decision. By examining users' geo-social behavior, we can detect those users whose access behavior deviates from the expected patterns; such suspicious behaviors can point to potential insider attackers who may deliberately or inadvertently carry out malicious activities. We use such information to establish how trustworthy a user is before granting access. We evaluate the G-SIR framework through extensive simulations and our results show that the proposed approach is efficient, scalable and effective.
机译:内部攻击是对组织最危险,最昂贵的攻击之一。这些攻击由具有合法权限的人访问。防止内部攻击是一项艰巨的任务。最近社交媒体和移动设备的激增提供了收集地理社交信息的新机会,这些信息可以帮助检测和阻止内部攻击。特别是,此类地理社交信息使我们能够更好地了解用户的上下文和行为。在本文中,我们提出了一种地缘社会内部人威胁弹性访问控制框架(G-SIR),以通过将当前和历史地缘社会信息作为访问控制决策过程的一部分来阻止内部人威胁。我们包括策略约束,以管理社区共谋,邻近威胁和可疑用户的风险,同时利用请求者周围的用户来做出访问决策。通过检查用户的地域社会行为,我们可以检测出其访问行为与预期模式有出入的那些用户。这种可疑的行为可能会指向潜在的内部攻击者,他们可能有意或无意地进行恶意活动。我们使用此类信息来建立用户在授予访问权限之前的可信度。我们通过广泛的仿真评估了G-SIR框架,我们的结果表明所提出的方法是有效,可扩展和有效的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号