skip to main content
10.1145/3374135.3385325acmconferencesArticle/Chapter ViewAbstractPublication Pagesacm-seConference Proceedingsconference-collections
poster

An Access Abstraction Model for Mitigating the Insider Threat

Published:25 May 2020Publication History

ABSTRACT

The risk represented by the legitimate members of organizations with their access to valuable information and services continues to increase with the adoption of information technology-based services. Misuses of such access create costs in terms of losses to businesses, and in some cases human costs.

The spectrum of techniques proposed to address the insider threat are varied, providing methods for detection, prevention and response. However, an insufficiently addressed matter is the role of new models in opening up routes for mitigations. An effective model for the insider threat is one that explicitly represents the critical space within which the violator acts, including the changes in the degree of exclusivity of access to resources.

Access abstraction provides both a new, enabling model for characterizing the insider threat operating environment and an indirect deterrent to the development of the threat.

References

  1. CERT National Insider Threat Center. 2018. Integrity Considerations for Secure Computer Systems (cmu/sei-2018-tr-010 ed.). Technical Report. Carnegie Mellon University. 168 pages.Google ScholarGoogle Scholar
  2. E. Cole. 2017. "Defending Against the Wrong Enemy: 2017 SANS Insider Threat Survey". SANS. Retrieved December 22, 2019 from http://www.sans.org/reading-room/whitepapers/awareness/defending-wrong-enemy-2017-insider-threat-survey-37890Google ScholarGoogle Scholar
  3. W. Eberle and L. Holder. 2009. Graph-based Approaches to Insider Threat Detection. In Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies (Oak Ridge, Tennessee, USA) (CSIIRW '09). ACM, New York, NY, USA, Article 44, 4 pages. https://doi.org/10.1145/1558607.1558658Google ScholarGoogle Scholar
  4. D. Ha, S. Upadhyaya, H. Ngo, S. Pramanik, R. Chinchani, and S. Mathew. 2007. Insider Threat Analysis Using Information-Centric Modeling. In Advances in Digital Forensics III, Philip Craiger and Sujeet Shenoi (Eds.). Springer New York, New York, NY, 55--73.Google ScholarGoogle Scholar
  5. PwC. 2018. "Global Economic Crime and Fraud Survey 2018". PwC. Retrieved December 22, 2019 from http://pwc.com/gx/en/forensics//global-economic-crime-and-fraud-survey-2018.pdfGoogle ScholarGoogle Scholar
  6. M.B. Salem, S. Hershkop, and S.J. Stolfo. 2008. A Survey of Insider Attack Detection Research. Insider Attack and Cyber Security. Advances in Information Security, Vol. 39. Springer, Boston. https://doi.org/10.1007/978-0-387-77322-3_5Google ScholarGoogle Scholar
  7. CERT Insider Threat Team. 2013. Unintentional Insider Threats: A Foundational Study (cmu/sei-2013-tn-022 ed.). Technical Report. Carnegie Mellon University. 91 pages.Google ScholarGoogle Scholar

Index Terms

  1. An Access Abstraction Model for Mitigating the Insider Threat

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      ACM SE '20: Proceedings of the 2020 ACM Southeast Conference
      April 2020
      337 pages
      ISBN:9781450371056
      DOI:10.1145/3374135

      Copyright © 2020 Owner/Author

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 25 May 2020

      Check for updates

      Author Tags

      Qualifiers

      • poster
      • Research
      • Refereed limited

      Acceptance Rates

      Overall Acceptance Rate178of377submissions,47%
    • Article Metrics

      • Downloads (Last 12 months)11
      • Downloads (Last 6 weeks)5

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader