Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise
Howard Chivers (),
John A. Clark (),
Philip Nobles (),
Siraj A. Shaikh () and
Hao Chen ()
Additional contact information
Howard Chivers: Cranfield University
John A. Clark: University of York
Philip Nobles: Cranfield University
Siraj A. Shaikh: Cranfield University
Hao Chen: University of York
Information Systems Frontiers, 2013, vol. 15, issue 1, No 3, 17-34
Abstract:
Abstract Insider attacks are often subtle and slow, or preceded by behavioral indicators such as organizational rule-breaking which provide the potential for early warning of malicious intent; both these cases pose the problem of identifying attacks from limited evidence contained within a large volume of event data collected from multiple sources over a long period. This paper proposes a scalable solution to this problem by maintaining long-term estimates that individuals or nodes are attackers, rather than retaining event data for post-facto analysis. These estimates are then used as triggers for more detailed investigation. We identify essential attributes of event data, allowing the use of a wide range of indicators, and show how to apply Bayesian statistics to maintain incremental estimates without global updating. The paper provides a theoretical account of the process, a worked example, and a discussion of its practical implications. The work includes examples that identify subtle attack behaviour in subverted network nodes, but the process is not network-specific and is capable of integrating evidence from other sources, such as behavioral indicators, document access logs and financial records, in addition to events identified by network monitoring.
Keywords: Insider; Behavioural; Subtle attack; Intrusion detection; Security; Evidence; Network; Bayesian (search for similar items in EconPapers)
Date: 2013
References: View complete reference list from CitEc
Citations: View citations in EconPapers (7)
Downloads: (external link)
http://link.springer.com/10.1007/s10796-010-9268-7 Abstract (text/html)
Access to the full text of the articles in this series is restricted.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:infosf:v:15:y:2013:i:1:d:10.1007_s10796-010-9268-7
Ordering information: This journal article can be ordered from
http://www.springer.com/journal/10796
DOI: 10.1007/s10796-010-9268-7
Access Statistics for this article
Information Systems Frontiers is currently edited by Ram Ramesh and Raghav Rao
More articles in Information Systems Frontiers from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().