Abstract
In this paper, we discuss an insider security which has been one of the biggest issues in the network security. By surveying and analyzing an issue of previous studies, we suggest an effective approach for future research. Approximately 90% of the information leakage incidents are recently being performed by internal workers. It is coming as a more serious problem than outsider attacks. The information leakage incident makes an organization or a company not only loses information but also gives a hard blow to the image. To prevent economic loss and damage to the image in advance, we need various research and development for effective solution.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Richardson, R.: 2003 CSI/FBI Computer Crime and Security Survey. Computer Security Institute (2003)
Gordon, L.A., Loeb, M.P., Lucyshyn, W., Richardson, R.: 2004 CSI/FBI Computer Crime and Security Survey. Computer Security Institute (2004)
Gordon, L.A., Loeb, M.P., Lucyshyn, W., Richardson, R.: 2005 CSI/FBI Computer Crime and Security Survey. Computer Security Institute (2005)
Gordon, L.A., Loeb, M.P., Lucyshyn, W., Richardson, R.: 2006 CSI/FBI Computer Crime and Security Survey. Computer Security Institute (2006)
Althebyan, Q., Panda, B.: A Knowledge-Base Model for Insider Threat Prediction. In: Proceedings of the 2007 IEEE Workshop on Information Assurance. United States Military Academy, West Point (2007)
Althebyan, Q., Panda, B.: A Knowledge-Based Bayesian Model for Analyzing a System after an Insider Attack. To Appear in the IFIP 23rd International Information Security Conference, Milan, Italy (September 2008)
Althebyan, Q., Panda, B.: Performance analysis of an insider threat mitigation model. In: ICDIM 2008, pp. 703–709 (2008)
Spitzner, L.: Honeypots: Catching the Insider Threat. In: 19th Annual Computer Security Applications Conference, ACSAC 2003 (2003)
Wang, H., Liu, S., Zhang, i.: A Prediction Model of Insider Threat Based on Multi-agent. In: 2006 1st International Symposium on Pervasive Computing and Applications (2006)
Schneier, B.: Attack trees: Modeling security threats. Dr. Dobb’s Journal (December 1999)
Santos Jr., E., Nguyen, H., Yu, F., Kim, K., Li, D., Wilkinson, J.T., Olson, A., Jacob, R.: Intent-driven Insider Threat Detection in Intelligence Analyses. In: 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology (2008)
Nguyen, H., Santos Jr., E., Zhao, Q., Wang, H.: Capturing User Intent for Information Retrieval. In: Proceedings of the 48th Annual Meeting for the Human Factors and Ergonomics Society (HFES 2004), New Orleans, LA, pp. 371–375 (2004b)
Santos Jr., E., Nguyen, H., Zhao, Q., Wang, H.: User modelling for intent prediction in information analysis. In: Proceedings of the 47th Annual Meeting for the Human Factors and Ergonomincs Society, pp. 1034–1038 (2003a)
Montes-y-Gómez, M., Gelbukh, A., Lópes-López, A.: Comparison of Conceptual Graphs. In: Cairó, O., Cantú, F.J. (eds.) MICAI 2000. LNCS, vol. 1793. Springer, Heidelberg (2000)
Liu, Y., Corbett, C., Archibald, R., Biswanath: SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack. In: Proceedings of the 42nd Hawaii International Conference on System Sciences (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hong, J., Kim, J., Cho, J. (2009). The Trend of the Security Research for the Insider Cyber Threat. In: Ślęzak, D., Kim, Th., Fang, WC., Arnett, K.P. (eds) Security Technology. SecTech 2009. Communications in Computer and Information Science, vol 58. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10847-1_13
Download citation
DOI: https://doi.org/10.1007/978-3-642-10847-1_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-10846-4
Online ISBN: 978-3-642-10847-1
eBook Packages: Computer ScienceComputer Science (R0)