Abstract
Insider threat has attracted considerable attention in security industry. It is difficult to detect insiders, because they know organization’s security countermeasures and usually hide their tracks in their normal activities. For evaluating insider detection algorithm on specific organization, it is important to generate a test suite with the corresponding normal activities. However, it is costly and time consuming to generate tailor-made test suite. Due to the complexity of combining different insider attack technique with different organization’s audit data, the insider attack scenario modeling issue arises when adaptively generate test suite for insider threat detection. In this paper, we propose the insider attack frame hierarchy to describe stereotype features of insider attack scenario. The proposed frame-based approach has been combined with the RBAC technologies, and its instantiation property allow us generate the customized insider attack test suite with full test coverage. The evaluation results show that most of experts satisfy with our proposed system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Kitts, B., et al.: Click fraud detection with bot signatures. In: 2013 IEEE International Conference on Intelligence and Security Informatics (2013)
Zhu, T.M., et al.: An insider threat detection method based on business process mining. Int. J. Bus. Data Commun. Netw. 13(2), 83–98 (2017)
Yaseen, Q., et al.: An insider threat aware access control for cloud relational databases. Clust. Comput. J. Netw. Softw. Tools Appl. 20(3), 2669–2685 (2017)
Almehmadi, A., El-Khatib, K.: On the possibility of insider threat prevention using Intent-Based Access Control (IBAC). IEEE Syst. J. 11(2), 373–384 (2017)
Bose, B., et al.: Detecting insider threats using RADISH: a system for real-time anomaly detection in heterogeneous data streams. IEEE Syst. J. 11(2), 471–482 (2017)
Aleman-Meza, B., Burns, P., Eavenson, M., Palaniswami, D., Sheth, A.: An ontological approach to the document access problem of insider threat. In: Kantor, P., et al. (eds.) ISI 2005. LNCS, vol. 3495, pp. 486–491. Springer, Heidelberg (2005). https://doi.org/10.1007/11427995_47
Zhang, N., et al.: Maintaining defender’s reputation in anomaly detection against insider attacks. IEEE Trans. Syst. Man Cybern. Part B-Cybern. 40(3), 597–611 (2010)
Agrafiotis, I., et al.: Formalising policies for insider-threat detection: a tripwire grammar. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. (JoWUA) 8(1), 26–43 (2017)
Kammüller, F., et al.: Insider threats and auctions: formalization, mechanized proof, and code generation. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. (JoWUA) 8(1), 26–43 (2017)
Kammüller, F., et al.: Enhancing video surveillance with usage control and privacy-preserving solutions. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. (JoWUA) 7(4), 20–40 (2016)
Pandit, T., et al.: Attribute-based signcryption: signer privacy, strong unforgeability and IND-CCA security in adaptive-predicates model (extended version). J. Internet Serv. Inf. Secur. (JISIS) 6(3), 61–113 (2016)
Guerar, M., et al.: ClickPattern: a pattern lock system resilient to smudge and side-channel attacks. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. (JoWUA) 8(2), 64–78 (2017)
Ishida, T., et al.: Implementation of an integrated disaster information cloud system for disaster control. J. Internet Serv. Inf. Secur. (JISIS) 7(4), 1–20 (2017)
Acknowledgement
This study is conducted under the “III Innovative and Prospective Technologies Project (1/1)” of the Institute for Information Industry which is subsidized by the Ministry of Economic Affairs of the Republic of China. This work was partially supported by National Science Council of the Republic of China under contracts 106-2511-S-468-002-MY3 and 106-2511-S-468-004-MY2.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Lee, TJ., Tseng, SS., Chen, HC., Lin, SC., Kao, CH. (2019). A Frame-Based Approach to Generating Insider Threat Test Suite on Cloud File-Sharing. In: You, I., Chen, HC., Sharma, V., Kotenko, I. (eds) Mobile Internet Security. MobiSec 2017. Communications in Computer and Information Science, vol 971. Springer, Singapore. https://doi.org/10.1007/978-981-13-3732-1_12
Download citation
DOI: https://doi.org/10.1007/978-981-13-3732-1_12
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-3731-4
Online ISBN: 978-981-13-3732-1
eBook Packages: Computer ScienceComputer Science (R0)