内部威胁检测的现状:调查回顾

Gaseb Alotibi, N. Clarke, Fudong Li, S. Furnell
{"title":"内部威胁检测的现状:调查回顾","authors":"Gaseb Alotibi, N. Clarke, Fudong Li, S. Furnell","doi":"10.1109/NCG.2018.8592986","DOIUrl":null,"url":null,"abstract":"Information Technology and the Internet are ubiquitous tools for companies. Various companies are increasingly deploying information technologies to increase their process efficiency and to minimize costs. Information technologies have redefined the ways of conducting businesses. These technological revolutions have changed the nature of doing business on a global scale; simultaneously the threats surrounding these technologies are on rise. There have been various cases found in the aspects of information misuse, security attacks etc., which can be put together as cybercrime. There are different security tools like Authentication, Access Control, Anti-Virus, Firewalls, Intrusion Detection Systems and Security Information and Event Management (SIEM) to enable organizations to control and mitigate information misuse and any threat surrounding the systems. However, they are effective in detecting outside threats, and often lack the ability to detect the insider threats (attacks undertaken by employees of the company). Insider threats have become one of the major information security challenges for the organizations. Traditional information security measures are focused on the threats from the outside environment rather than the internal environments. A wide range of research has been undertaken to investigate approaches to detect the insider threats. The study has identified packet based and flow based network analysis as the two popular approaches in detecting internal threats. This paper presents a comprehensive analysis, literature review and limitations on network traffic analysis approaches.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"356 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"The Current Situation of Insider Threats Detection: An Investigative Review\",\"authors\":\"Gaseb Alotibi, N. Clarke, Fudong Li, S. Furnell\",\"doi\":\"10.1109/NCG.2018.8592986\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Information Technology and the Internet are ubiquitous tools for companies. Various companies are increasingly deploying information technologies to increase their process efficiency and to minimize costs. Information technologies have redefined the ways of conducting businesses. These technological revolutions have changed the nature of doing business on a global scale; simultaneously the threats surrounding these technologies are on rise. There have been various cases found in the aspects of information misuse, security attacks etc., which can be put together as cybercrime. There are different security tools like Authentication, Access Control, Anti-Virus, Firewalls, Intrusion Detection Systems and Security Information and Event Management (SIEM) to enable organizations to control and mitigate information misuse and any threat surrounding the systems. However, they are effective in detecting outside threats, and often lack the ability to detect the insider threats (attacks undertaken by employees of the company). Insider threats have become one of the major information security challenges for the organizations. Traditional information security measures are focused on the threats from the outside environment rather than the internal environments. A wide range of research has been undertaken to investigate approaches to detect the insider threats. The study has identified packet based and flow based network analysis as the two popular approaches in detecting internal threats. This paper presents a comprehensive analysis, literature review and limitations on network traffic analysis approaches.\",\"PeriodicalId\":305464,\"journal\":{\"name\":\"2018 21st Saudi Computer Society National Computer Conference (NCC)\",\"volume\":\"356 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-04-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 21st Saudi Computer Society National Computer Conference (NCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NCG.2018.8592986\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 21st Saudi Computer Society National Computer Conference (NCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NCG.2018.8592986","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

信息技术和互联网是企业无处不在的工具。各种公司越来越多地部署信息技术,以提高流程效率并将成本降至最低。信息技术重新定义了开展业务的方式。这些技术革命改变了在全球范围内开展业务的性质;与此同时,围绕这些技术的威胁也在上升。在信息滥用、安全攻击等方面已经发现了各种各样的案例,这些案例可以统称为网络犯罪。有不同的安全工具,如身份验证、访问控制、反病毒、防火墙、入侵检测系统和安全信息和事件管理(SIEM),使组织能够控制和减轻信息滥用和系统周围的任何威胁。然而,它们在检测外部威胁方面是有效的,而往往缺乏检测内部威胁(由公司员工发起的攻击)的能力。内部威胁已经成为组织面临的主要信息安全挑战之一。传统的信息安全措施侧重于外部环境的威胁,而不是内部环境的威胁。已经开展了广泛的研究,以调查检测内部威胁的方法。该研究确定了基于数据包和基于流量的网络分析是检测内部威胁的两种流行方法。本文介绍了网络流量分析方法的综合分析、文献综述和局限性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
The Current Situation of Insider Threats Detection: An Investigative Review
Information Technology and the Internet are ubiquitous tools for companies. Various companies are increasingly deploying information technologies to increase their process efficiency and to minimize costs. Information technologies have redefined the ways of conducting businesses. These technological revolutions have changed the nature of doing business on a global scale; simultaneously the threats surrounding these technologies are on rise. There have been various cases found in the aspects of information misuse, security attacks etc., which can be put together as cybercrime. There are different security tools like Authentication, Access Control, Anti-Virus, Firewalls, Intrusion Detection Systems and Security Information and Event Management (SIEM) to enable organizations to control and mitigate information misuse and any threat surrounding the systems. However, they are effective in detecting outside threats, and often lack the ability to detect the insider threats (attacks undertaken by employees of the company). Insider threats have become one of the major information security challenges for the organizations. Traditional information security measures are focused on the threats from the outside environment rather than the internal environments. A wide range of research has been undertaken to investigate approaches to detect the insider threats. The study has identified packet based and flow based network analysis as the two popular approaches in detecting internal threats. This paper presents a comprehensive analysis, literature review and limitations on network traffic analysis approaches.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信