一种开发高级内部攻击检测模块的系统方法

Keshav Kaushik
{"title":"一种开发高级内部攻击检测模块的系统方法","authors":"Keshav Kaushik","doi":"10.5455/JEAS.2021050104","DOIUrl":null,"url":null,"abstract":"The insider threat is one of the most moving issues to identify because of its perplexing nature and huge effect on associations. Insiders represent an extraordinary threat to associations because of their insight on the association and its security conventions, their approved access to the association's assets, and the trouble of perceiving the conduct of an insider threat from an ordinary representative's conduct. Thus, the insider-threat field faces the test of creating recognition arrangements that can identify threats without producing an incredible number of bogus positives and can mull over the non-specialized part of the issue. A possibility to concentrate on threat location was led to assess the recognition execution of the proposed arrangement and its ease of use. The field can profit from our proposed systematic approach that is scientific classification and novel arrangement of research that adds to the association and disambiguation of insider threat occurrences and the protection arrangements utilized against them. Clients with genuine access to delicate and confidential information have been authorized by insiders, who may know about the vulnerabilities of the systems and business types submitted. Numerous cyber-attacks brought about by malicious insiders are progressively hard to recognize contrasted with those of outside assailants whose impressions are more enthusiastically to cover up. The paper aims to propose a systematic approach to develop an advanced insider attacks detection module. The approach proposed in this paper will help the organization to early detect the insider threat and help them in performing more effectively in cyberspace.","PeriodicalId":15681,"journal":{"name":"Journal of Engineering and Applied Sciences","volume":"51 1","pages":"33-41"},"PeriodicalIF":0.0000,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"A Systematic Approach to Develop an Advanced Insider Attacks Detection Module\",\"authors\":\"Keshav Kaushik\",\"doi\":\"10.5455/JEAS.2021050104\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The insider threat is one of the most moving issues to identify because of its perplexing nature and huge effect on associations. Insiders represent an extraordinary threat to associations because of their insight on the association and its security conventions, their approved access to the association's assets, and the trouble of perceiving the conduct of an insider threat from an ordinary representative's conduct. Thus, the insider-threat field faces the test of creating recognition arrangements that can identify threats without producing an incredible number of bogus positives and can mull over the non-specialized part of the issue. A possibility to concentrate on threat location was led to assess the recognition execution of the proposed arrangement and its ease of use. The field can profit from our proposed systematic approach that is scientific classification and novel arrangement of research that adds to the association and disambiguation of insider threat occurrences and the protection arrangements utilized against them. Clients with genuine access to delicate and confidential information have been authorized by insiders, who may know about the vulnerabilities of the systems and business types submitted. Numerous cyber-attacks brought about by malicious insiders are progressively hard to recognize contrasted with those of outside assailants whose impressions are more enthusiastically to cover up. The paper aims to propose a systematic approach to develop an advanced insider attacks detection module. The approach proposed in this paper will help the organization to early detect the insider threat and help them in performing more effectively in cyberspace.\",\"PeriodicalId\":15681,\"journal\":{\"name\":\"Journal of Engineering and Applied Sciences\",\"volume\":\"51 1\",\"pages\":\"33-41\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Engineering and Applied Sciences\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5455/JEAS.2021050104\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Engineering and Applied Sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5455/JEAS.2021050104","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

内部威胁是最令人感动的问题之一,因为它令人困惑的性质和对协会的巨大影响。圈内人对协会来说是一种非同寻常的威胁,因为他们对协会及其安全公约的洞察力,他们获得协会资产的许可,以及从普通代表的行为中识别圈内人威胁的麻烦。因此,内部威胁领域面临着创建识别安排的考验,该安排既可以识别威胁,又不会产生大量的假阳性,并且可以仔细考虑问题的非专业部分。有可能将重点放在威胁位置上,以评估拟议安排的识别执行情况及其易用性。该领域可以从我们提出的系统方法中获益,即科学分类和新颖的研究安排,增加了内部威胁事件的关联和消除歧义,并利用了针对它们的保护安排。能够真正访问敏感和机密信息的客户已获得内部人员的授权,这些内部人员可能知道所提交的系统和业务类型的漏洞。恶意的内部人员发起的大量网络攻击越来越难以识别,而外部攻击者的印象则更热衷于掩盖。本文旨在提出一种系统的方法来开发先进的内部攻击检测模块。本文提出的方法将帮助组织尽早发现内部威胁,并帮助他们在网络空间中更有效地执行。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A Systematic Approach to Develop an Advanced Insider Attacks Detection Module
The insider threat is one of the most moving issues to identify because of its perplexing nature and huge effect on associations. Insiders represent an extraordinary threat to associations because of their insight on the association and its security conventions, their approved access to the association's assets, and the trouble of perceiving the conduct of an insider threat from an ordinary representative's conduct. Thus, the insider-threat field faces the test of creating recognition arrangements that can identify threats without producing an incredible number of bogus positives and can mull over the non-specialized part of the issue. A possibility to concentrate on threat location was led to assess the recognition execution of the proposed arrangement and its ease of use. The field can profit from our proposed systematic approach that is scientific classification and novel arrangement of research that adds to the association and disambiguation of insider threat occurrences and the protection arrangements utilized against them. Clients with genuine access to delicate and confidential information have been authorized by insiders, who may know about the vulnerabilities of the systems and business types submitted. Numerous cyber-attacks brought about by malicious insiders are progressively hard to recognize contrasted with those of outside assailants whose impressions are more enthusiastically to cover up. The paper aims to propose a systematic approach to develop an advanced insider attacks detection module. The approach proposed in this paper will help the organization to early detect the insider threat and help them in performing more effectively in cyberspace.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信