A framework for understanding and predicting insider attacks

被引:155
作者
Schultz, EE [1 ]
机构
[1] Univ Calif Berkeley Lab, Berkeley, CA USA
关键词
insider; insider attacks; insider attack prediction; insider attack detection; insider threat; attack indicators;
D O I
10.1016/S0167-4048(02)01009-X
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper an insider attack is considered to be deliberate misuse by those who are authorized to use computers and networks. Applying this definition in real-life settings to determine whether or not an attack was caused by an insider is often, however, anything but straightforward. We know very little about insider attacks, and misconceptions concerning insider attacks abound. The belief that "most attacks come from inside" is held by many information security professionals, for example, even though empirical statistics and firewaU togs indicate otherwise. This paper presents a framework based on previous studies and models of insider behavior as well as first-hand experience in dealing with insider attacks. This framework defines relevant types of insider attack-related behaviors and symptoms-"indicators" that include deliberate markers, meaningful errors, preparatory behaviors, correlated usage patterns, verbal behavior and personality traits. From these sets of indicators, clues can be pieced together to predict and detect an attack. The presence of numerous small clues necessitates the use of quantitative methods; multiple regression equations appear to be a particularly promising approach for quantifying prediction.
引用
收藏
页码:526 / 531
页数:6
相关论文
共 12 条
[1]  
[Anonymous], 2001, Incident response: A strategic guide to handling system and network security breaches
[2]  
[Anonymous], 1992, FLAMING RELATIONSHIP
[3]  
Einwechter N., 2002, PREVENTING DETECTING
[4]  
GUDAITIS TM, 1999, CYBERPSYCHOL BEHAV, V1, P4
[5]  
MORAHANMARTIN J, 1998, IRISS C 25 27 MARCH
[6]  
Parker D., 1998, Fighting Computer Crime
[7]  
SHAW ED, 1998, SECURITY AWARENESS B, V2, P27
[8]  
SULER J, 1998, BAD BOYS CYBERSPACE
[9]  
TUGLULAR T, 1997, UNPUB FRAMEWORK CHAR
[10]  
WOOD BJ, 2002, INSIDER THREAT MODEL