Skip to main content

MITIS - An Insider Threats Mitigation Framework for Information Systems

  • Conference paper
  • First Online:
Future Data and Security Engineering (FDSE 2017)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10646))

Included in the following conference series:

Abstract

Cloud computing is now among the most extensively used mean for resource sharing as SaaS, PaaS, and IaaS. Computing Scenarios have been emerged into cloud computing instead of distributed computing. It has provided an efficient and flexible way for dynamic services meeting needs and challenges of the time in cost effective manners. Virtual environments provided the opportunity to migrate traditional systems to the cloud. Cloud service providers and Administrators generally have full access on Virtual Machines (VMs) whereas tenants have limited access on respective VMs. Cloud Admins as well as remote administrators also have full access rights on respective resources and may pose severe insiders threats on which tenants haven shown their concerns. Securing these resources are the key issues. In this paper, available practices for cloud security are investigated and a self-managed framework is introduced to mitigate malicious insider threats posed to these virtual environments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Data breach statistics by year, industry, more - breach level index. http://breachlevelindex.com/. Accessed 21 May 2017

  2. Baracaldo, N., Palanisamy, B., Joshi, J.: G-sir: an insider attack resilient geo-social access control framework. IEEE Trans. Dependable Sec. Comput. (2017)

    Google Scholar 

  3. Beloglazov, A., Buyya, R., Lee, Y.C., Zomaya, A., et al.: A taxonomy and survey of energy-efficient data centers and cloud computing systems. Adv. Comput. 82(2), 47–111 (2011)

    Article  Google Scholar 

  4. Bisong, A., Rahman, M., et al.: An overview of the security concerns in enterprise cloud computing. arXiv preprint (2011). arXiv:1101.5613

  5. Bunn, M., Sagan, S.D.: A worst practices guide to insider threats: lessons from past mistakes. Lang. Magaz. 3, 1 (2017)

    Google Scholar 

  6. Chi, H., Rubio, D.A.: Design insider threat hands-on labs. In: InfoSecCD, pp. 1–17 (2015)

    Google Scholar 

  7. Crawford, M., Peterson, G.: Insider threat detection using virtual machine introspection. In: 2013 46th Hawaii International Conference on System Sciences (HICSS), pp. 1821–1830. IEEE (2013)

    Google Scholar 

  8. Elmrabit, N., Yang, S.H., Yang, L.: Insider threats in information security categories and approaches. In: 2015 21st International Conference on Automation and Computing (ICAC), pp. 1–6. IEEE (2015)

    Google Scholar 

  9. Flynn, L., Huth, C., Trzeciak, R., Buttles, P.: Best practices against insider threats in all nations (2013)

    Google Scholar 

  10. Greitzer, F.L., Moore, A.P., Cappelli, D.M., Andrews, D.H., Carroll, L.A., Hull, T.D.: Combating the insider cyber threat. IEEE Secur. Priv. 6(1), 61–64 (2008)

    Article  Google Scholar 

  11. Jouini, M., Rabai, L.B.A., Aissa, A.B.: Classification of security threats in information systems. Procedia Comput. Sci. 32, 489–496 (2014)

    Article  Google Scholar 

  12. Kandias, M., Stavrou, V., Bozovic, N., Mitrou, L., Gritzalis, D.: Can we trust this user? Predicting insider’s attitude via youtube usage profiling. In: 2013 IEEE 10th International Conference on and 10th International Conference on Autonomic and Trusted Computing, Ubiquitous Intelligence and Computing (UIC/ATC), pp. 347–354. IEEE (2013)

    Google Scholar 

  13. Kandias, M., Virvilis, N., Gritzalis, D.: The insider threat in cloud computing. In: Bologna, S., Hämmerli, B., Gritzalis, D., Wolthusen, S. (eds.) CRITIS 2011. LNCS, vol. 6983, pp. 93–103. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-41476-3_8

    Chapter  Google Scholar 

  14. Khadse, D., Amle, A., Charde, S., Deulkar, S., Patil, P.: Securing cloud using fog: a review (2017)

    Google Scholar 

  15. Khan, M.A.: A survey of security issues for cloud computing. J. Netw. Comput. Appl. 71, 11–29 (2016)

    Article  Google Scholar 

  16. Kul, G., Upadhyaya, S.: Towards a cyber ontology for insider threats in the financial sector. J. Wirel. Mobile Netw. Ubiquit. Comput. Dependable Appl. 6(4), 64–85 (2015)

    Google Scholar 

  17. Li, Y., Gai, K., Qiu, L., Qiu, M., Zhao, H.: Intelligent cryptography approach for secure distributed big data storage in cloud computing. Inf. Sci. 387, 103–115 (2017)

    Article  Google Scholar 

  18. Melis, A., Prandini, M., Giallorenzo, S., Callegati, F.: Insider threats in emerging mobility-as-a-service scenarios. In: Proceedings of the 50th Hawaii International Conference on System Sciences (2017)

    Google Scholar 

  19. Mishra, P., Pilli, E.S., Varadharajan, V., Tupakula, U.: Intrusion detection techniques in cloud environment: a survey. J. Netw. Comput. Appl. 77, 18–47 (2017)

    Article  Google Scholar 

  20. Richardson, R., Director, C.: CSI computer crime and security survey. Comput. Secur. Inst. 1, 1–30 (2008)

    Google Scholar 

  21. Schlicher, B.G., MacIntyre, L.P., Abercrombie, R.K.: Towards reducing the data exfiltration surface for the insider threat. In: 2016 49th Hawaii International Conference on System Sciences (HICSS), pp. 2749–2758. IEEE (2016)

    Google Scholar 

  22. Silowash, G., Cappelli, D., Moore, A., Trzeciak, R., Shimeall, T.J., Flynn, L.: Common sense guide to mitigating insider threats, 4th edn. Technical report, DTIC Document (2012)

    Google Scholar 

  23. Sokolowski, J.A., Banks, C.M.: Agent implementation for modeling insider threat. In: Proceedings of the 2015 Winter Simulation Conference, pp. 266–275. IEEE Press (2015)

    Google Scholar 

  24. Szefer, J., Jamkhedkar, P., Perez-Botero, D., Lee, R.B.: Cyber defenses for physical attacks and insider threats in cloud computing. In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, pp. 519–524. ACM (2014)

    Google Scholar 

  25. Insider Threat Integrated Process Team. DoD insider threat mitigation (2000)

    Google Scholar 

  26. Theoharidou, M., Kokolakis, S., Karyda, M., Kiountouzis, E.: The insider threat to information systems and the effectiveness of ISO17799. Comput. Secur. 24(6), 472–484 (2005)

    Article  Google Scholar 

  27. Westphal, F., Axelsson, S., Neuhaus, C., Polze, A.: VMI-PL: a monitoring language for virtual platforms using virtual machine introspection. Digit. Invest. 11, S85–S94 (2014)

    Article  Google Scholar 

  28. Yaseen, Q., Jararweh, Y., Panda, B., Althebyan, Q.: An insider threat aware access control for cloud relational databases. Cluster Comput. 20, 1–17 (2017)

    Article  Google Scholar 

  29. Yu, T., Fayaz, S.K., Collins, M., Sekar, V., Seshan, S.: PSI: precise security instrumentation for enterprise networks (2017)

    Google Scholar 

  30. Yusop, Z.M., Abawajy, J.: Analysis of insiders attack mitigation strategies. Procedia Soc. Behav. Sci. 129, 581–591 (2014)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Muhammad Ilyas .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ali, A., Ahmed, M., Ilyas, M., Küng, J. (2017). MITIS - An Insider Threats Mitigation Framework for Information Systems. In: Dang, T., Wagner, R., Küng, J., Thoai, N., Takizawa, M., Neuhold, E. (eds) Future Data and Security Engineering. FDSE 2017. Lecture Notes in Computer Science(), vol 10646. Springer, Cham. https://doi.org/10.1007/978-3-319-70004-5_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-70004-5_29

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-70003-8

  • Online ISBN: 978-3-319-70004-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics