Two-Dimensional Traceability Link Rule Mining for Detection of Insider Attacks

Y. Hu, B. Panda
{"title":"Two-Dimensional Traceability Link Rule Mining for Detection of Insider Attacks","authors":"Y. Hu, B. Panda","doi":"10.1109/HICSS.2010.414","DOIUrl":null,"url":null,"abstract":"Organizations face a growing threat of insider attacks. This paper presents a model for detecting insider malicious activities targeted at tampering the contents of files for various purposes. It employs two-dimensional traceability link rule mining to identify intrinsic file dependencies. Traceability links are traditionally used by software practitioners and researchers to uncover the relationships between programs and documents in a software system. In this research, we borrow the concept of traceability link from software engineering realm and use traceability links to model file access patterns. Activities that modify data without complying with various file traceability link rules will be identified as suspicious activities. Because file traceability links are less prone to change than individual user's file access patterns, the insider attack detection model built on traceability links is more effective than many existing systems based on usage patterns.","PeriodicalId":328811,"journal":{"name":"2010 43rd Hawaii International Conference on System Sciences","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 43rd Hawaii International Conference on System Sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HICSS.2010.414","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Organizations face a growing threat of insider attacks. This paper presents a model for detecting insider malicious activities targeted at tampering the contents of files for various purposes. It employs two-dimensional traceability link rule mining to identify intrinsic file dependencies. Traceability links are traditionally used by software practitioners and researchers to uncover the relationships between programs and documents in a software system. In this research, we borrow the concept of traceability link from software engineering realm and use traceability links to model file access patterns. Activities that modify data without complying with various file traceability link rules will be identified as suspicious activities. Because file traceability links are less prone to change than individual user's file access patterns, the insider attack detection model built on traceability links is more effective than many existing systems based on usage patterns.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
面向内部攻击检测的二维可追溯性链接规则挖掘
企业面临着日益严重的内部攻击威胁。本文提出了一种用于检测内部恶意活动的模型,该活动的目标是出于各种目的篡改文件内容。它采用二维可跟踪链接规则挖掘来识别内在的文件依赖关系。可追溯性链接传统上被软件从业者和研究人员用来揭示软件系统中程序和文档之间的关系。在本研究中,我们借用了软件工程领域的可追溯性链接的概念,使用可追溯性链接对文件访问模式进行建模。修改数据而不遵守各种文件可追溯性链接规则的活动将被识别为可疑活动。由于文件可跟踪性链接比单个用户的文件访问模式更不容易发生变化,因此建立在可跟踪性链接上的内部攻击检测模型比许多基于使用模式的现有系统更有效。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
mHealth for Influenza Pandemic Surveillance in Developing Countries Unpacking the Dynamics of IS User Improvisation: A Research Framework Complex Software Systems in Legacy and Modern Environments: A Case Study of the PicklingTools Library Lessons from the Development of SSEUS: A System for Entry and Management of Peer-Reviewed Data Sequencing the Development Order of Architecture Products: An Application to DoDAF
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1