期刊文献+

内部威胁检测研究 被引量:14

Survey of Insider Threat Detection
下载PDF
导出
摘要 近年来,以系统破坏、信息窃取以及电子欺诈为主的内部攻击因为隐蔽性强、破坏性大的特点对个人与企业,甚至国家安全造成了严重威胁。因此十分有必要关注内部威胁已有的研究成果与发展趋势。本文分析了内部威胁的特征,提出基于信任理论的形式化定义。同时将当前内部威胁研究热点归结为内部威胁模型研究、主观要素研究、客观要素研究及其它研究四个领域,分别介绍各个领域的研究状况,并对每个领域的研究进展进行归纳和分析。通过分析内部威胁已有案例以及当前研究进展,针对现有研究不足提出新型内部威胁检测系统,并展望未来的关键技术。 In recent years, insider attack including information system sabotage, information theft and electronic fraud has been great threats to individuals, business and state security, resulting from strong concealment and destructiveness. Therefore we should pay more attention to insider threat's current research findings and evolution trends. In this paper we analyze the features of insider threat and define insider threat formally based on the trust theory. Meanwhile we divide the insider threat researches into four fields: model research, subjective factors, objective factors and other research while analyzing each field in detail. Based on the analysis of cases and deficiency of current researches we develop the Open Hybrid Insider Threat Detection System and predict possible evolution trends of insider threat. Finally we suggest possible countermeasures against insider threat.
出处 《信息安全学报》 2016年第3期21-36,共16页 Journal of Cyber Security
关键词 内部威胁 内部审计 异常检测 网络安全 系统破坏 信息窃取 电子欺诈 综述 insider threat internal audit anomaly detection cyber security system sabotage information theft electronic deception survey
  • 相关文献

参考文献5

二级参考文献47

  • 1史美林,钱俊,许超.入侵检测系统数据集评测研究[J].计算机科学,2006,33(8):1-8. 被引量:24
  • 2吕昱,程代杰.基于隐马尔可夫模型的符号序列自组织聚类[J].计算机科学,2006,33(8):210-212. 被引量:3
  • 3王辉,刘淑芬.一种可扩展的内部威胁预测模型[J].计算机学报,2006,29(8):1346-1355. 被引量:22
  • 4郭浩,欧宗瑛.基于隐马尔可夫模型的指纹分类研究[J].小型微型计算机系统,2006,27(9):1718-1721. 被引量:2
  • 5Cole E, Ring S. Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft. Rockland, MA: Syngress, 2005
  • 6Pfleeger C P. Reflections on the Insider Threat, Insider Attack and Cyber Security. Springer, 2008:5-16
  • 7Wood B J. An insider threat model for adversary simulation//Proceedings of a Workshop with Title " Research on Mitigating the Insider Threat to Information Systems". Arlington VA, 2000:41-48
  • 8Parker D B. Fighting Computer Crime: A New Framework for Protecting Information. New York: John Wiley & Sons, 1998
  • 9Park J S, Ho S M. Composite role-based monitoring (CRBM) for countering insider threats//Proceedings of the Intelligence and Security Informatics. Tucson, AZ, USA, 2004:201-213
  • 10Ray I, Poolsapassit I. Using attack trees to identify malicious attacks from authorized insiders//Proceedings of the Computer Security - ESORICS 2005. Milan, Italy, 2005: 231- 246

共引文献162

同被引文献147

引证文献14

二级引证文献82

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部