Skip to main content

Insider Threat Likelihood Assessment for Flexible Access Control

  • Conference paper
  • First Online:
E-Technologies: Embracing the Internet of Things (MCETECH 2017)

Part of the book series: Lecture Notes in Business Information Processing ((LNBIP,volume 289))

Included in the following conference series:

  • 949 Accesses

Abstract

Users who request to access protected objects must obtain the authorization of access control systems. Among the elements of decision for such systems should be the risk of authorizing accesses under various assumptions, and one of the notions of risk is threat likelihood. Access control systems deals essentially with insider threats coming from people within the organization, such as employees, business associates or contractors, who could violate access control policies. We present in this paper a new approach for insider threat likelihood assessment for secrecy and integrity properties by considering reading and writing operations within the context of access control systems. Access operations, the trustworthiness of subjects, the sensitivity of objects, and the applied security countermeasures are all considered in the assessment of the likelihood of this category of insider threats. Both qualitative and quantitative assessments are provided. Hence our approach makes it possible to compare and calculate the likelihoods of these insider threats, leading to more flexible and more informed access control decisions in various situations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bartsch, S.: A calculus for the qualitative risk assessment of policy override authorization. In: Proceedings of the International Conference on Security of Information and Networks, pp. 62–70 (2010)

    Google Scholar 

  2. Bishop, M., Gates, C.: Defining the insider threat. In: Proceedings of the 4th Annual Workshop on Cyber Security and Information Intelligence Research: Developing Strategies to Meet the Cyber Security and Information Intelligence Challenges Ahead, p. 15 (2008)

    Google Scholar 

  3. Boulares, S., Adi, K., Logrippo, L.: Insider threat likelihood assessment for access control systems: quantitative approach. In: International Symposium on Foundations and Practice of Security, pp. 135–142 (2016)

    Google Scholar 

  4. Caputo, D., Maloof, M., Stephens, G.: Detecting insider theft of trade secrets. IEEE Secur. Priv. 7(6), 14–21 (2009)

    Article  Google Scholar 

  5. Cheng, P., Rohatgi, P., Keser, C., Karger, P., Wagner, G., Reninger, A.: Fuzzy multilevel security: an experiment on quantified risk-adaptive access control. In: Security and Privacy, pp. 222–230 (2007)

    Google Scholar 

  6. Clusif. MEHARI 2010 principes fondamentaux et spécification fonctionnelles (2009)

    Google Scholar 

  7. Diep, N., Hung, L., Zhung, Y., Lee, S., Lee, Y., Lee, H.: Enforcing access control using risk assessment. In: Fourth European Conference on Universal Multiservice Networks, pp. 419–424 (2007)

    Google Scholar 

  8. Fagade, T., Tryfonas, T.: Security by Compliance? A study of insider threat implications for Nigerian banks. In: International Conference on Human Aspects of Information Security, Privacy, and Trust, pp. 128–139 (2016)

    Google Scholar 

  9. International Organization for Standardization. ISO/IEC 27001: Information technology - Security techniques - Information security management systems - Requirements (2013)

    Google Scholar 

  10. IT Global Corporate. Security risks (2013)

    Google Scholar 

  11. INFOSEC Glossary. National information systems security (infosec) glossary (2000)

    Google Scholar 

  12. Greitzer, F., Hohimer, R.: Modeling human behavior to anticipate insider attacks. J. Strateg. Secur. 4(2), 25 (2011)

    Article  Google Scholar 

  13. Hua, J., Bapna, S.: Who can we trust? The economic impact of insider threats. J. Global Inf. Technol. Manag. 16(4), 47–67 (2013)

    Article  Google Scholar 

  14. Kandala, S., Sandhu, R., Bhamidipati, V.: An attribute based framework for risk-adaptive access control models. In: Availability, Reliability and Security, pp. 236–241 (2011)

    Google Scholar 

  15. Khambhammettu, H., Boulares, S., Adi, K., Logrippo, L.: A framework for threat assessment in access control systems. In: Information Security and Privacy Research, pp. 187–198 (2012)

    Google Scholar 

  16. Khambhammettu, H., Boulares, S., Adi, K., Logrippo, L.: A framework for risk assessment in access control systems. Comput. Secur. 39, 86–103 (2013)

    Article  Google Scholar 

  17. McGraw, R.: Risk-adaptable access control (radac). In: Privilege (Access) Management Workshop. National Institute of Standards and Technology (2009)

    Google Scholar 

  18. Meucci, M., Muller, A.: The OWASP testing guide 4.0. Open Web Application Security Project, p. 30 (2014)

    Google Scholar 

  19. NIST. Risk management guide for information technology systems (2002)

    Google Scholar 

  20. Sandhu, R.: Lattice-based access control models. Computer 26(11), 9–19 (1993)

    Article  Google Scholar 

  21. Shey, H., Mak, K., Balaouras, S., Luu, B.: Understand the state of data security and privacy: Forrester Research 10 (2013)

    Google Scholar 

  22. Stoneburner, G., Goguen, A., Feringa, A.: Risk management guide for information technology systems (2002)

    Google Scholar 

  23. Wang, Q., Jin, H.: Quantified risk-adaptive access control for patient privacy protection in health information systems. In: Proceedings of the ACM Symposium on Information, Computer and Communications Security, pp. 406–410 (2011)

    Google Scholar 

  24. Weissman, C.: Security controls in the adept-50 time-sharing system. In: Proceedings of the Fall Joint Computer Conference, pp. 119–133 (1969)

    Google Scholar 

Download references

Acknowledgements

This research was partially supported by the Natural Sciences and Engineering Research Council of Canada.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sofiene Boulares .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Boulares, S., Adi, K., Logrippo, L. (2017). Insider Threat Likelihood Assessment for Flexible Access Control. In: Aïmeur, E., Ruhi, U., Weiss, M. (eds) E-Technologies: Embracing the Internet of Things . MCETECH 2017. Lecture Notes in Business Information Processing, vol 289. Springer, Cham. https://doi.org/10.1007/978-3-319-59041-7_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-59041-7_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-59040-0

  • Online ISBN: 978-3-319-59041-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics