A Systematic Approach to Develop an Advanced Insider Attacks Detection Module

Keshav Kaushik
{"title":"A Systematic Approach to Develop an Advanced Insider Attacks Detection Module","authors":"Keshav Kaushik","doi":"10.5455/JEAS.2021050104","DOIUrl":null,"url":null,"abstract":"The insider threat is one of the most moving issues to identify because of its perplexing nature and huge effect on associations. Insiders represent an extraordinary threat to associations because of their insight on the association and its security conventions, their approved access to the association's assets, and the trouble of perceiving the conduct of an insider threat from an ordinary representative's conduct. Thus, the insider-threat field faces the test of creating recognition arrangements that can identify threats without producing an incredible number of bogus positives and can mull over the non-specialized part of the issue. A possibility to concentrate on threat location was led to assess the recognition execution of the proposed arrangement and its ease of use. The field can profit from our proposed systematic approach that is scientific classification and novel arrangement of research that adds to the association and disambiguation of insider threat occurrences and the protection arrangements utilized against them. Clients with genuine access to delicate and confidential information have been authorized by insiders, who may know about the vulnerabilities of the systems and business types submitted. Numerous cyber-attacks brought about by malicious insiders are progressively hard to recognize contrasted with those of outside assailants whose impressions are more enthusiastically to cover up. The paper aims to propose a systematic approach to develop an advanced insider attacks detection module. The approach proposed in this paper will help the organization to early detect the insider threat and help them in performing more effectively in cyberspace.","PeriodicalId":15681,"journal":{"name":"Journal of Engineering and Applied Sciences","volume":"51 1","pages":"33-41"},"PeriodicalIF":0.0000,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Engineering and Applied Sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5455/JEAS.2021050104","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

The insider threat is one of the most moving issues to identify because of its perplexing nature and huge effect on associations. Insiders represent an extraordinary threat to associations because of their insight on the association and its security conventions, their approved access to the association's assets, and the trouble of perceiving the conduct of an insider threat from an ordinary representative's conduct. Thus, the insider-threat field faces the test of creating recognition arrangements that can identify threats without producing an incredible number of bogus positives and can mull over the non-specialized part of the issue. A possibility to concentrate on threat location was led to assess the recognition execution of the proposed arrangement and its ease of use. The field can profit from our proposed systematic approach that is scientific classification and novel arrangement of research that adds to the association and disambiguation of insider threat occurrences and the protection arrangements utilized against them. Clients with genuine access to delicate and confidential information have been authorized by insiders, who may know about the vulnerabilities of the systems and business types submitted. Numerous cyber-attacks brought about by malicious insiders are progressively hard to recognize contrasted with those of outside assailants whose impressions are more enthusiastically to cover up. The paper aims to propose a systematic approach to develop an advanced insider attacks detection module. The approach proposed in this paper will help the organization to early detect the insider threat and help them in performing more effectively in cyberspace.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
一种开发高级内部攻击检测模块的系统方法
内部威胁是最令人感动的问题之一,因为它令人困惑的性质和对协会的巨大影响。圈内人对协会来说是一种非同寻常的威胁,因为他们对协会及其安全公约的洞察力,他们获得协会资产的许可,以及从普通代表的行为中识别圈内人威胁的麻烦。因此,内部威胁领域面临着创建识别安排的考验,该安排既可以识别威胁,又不会产生大量的假阳性,并且可以仔细考虑问题的非专业部分。有可能将重点放在威胁位置上,以评估拟议安排的识别执行情况及其易用性。该领域可以从我们提出的系统方法中获益,即科学分类和新颖的研究安排,增加了内部威胁事件的关联和消除歧义,并利用了针对它们的保护安排。能够真正访问敏感和机密信息的客户已获得内部人员的授权,这些内部人员可能知道所提交的系统和业务类型的漏洞。恶意的内部人员发起的大量网络攻击越来越难以识别,而外部攻击者的印象则更热衷于掩盖。本文旨在提出一种系统的方法来开发先进的内部攻击检测模块。本文提出的方法将帮助组织尽早发现内部威胁,并帮助他们在网络空间中更有效地执行。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Research on Self-Propagating High-Temperature Synthesis of Ceramic Matrix Composites Challenges and Opportunities of Irrigated Wheat (Triticum Estievum L.) Production in Jimma Zone South West Ethiopia: A Review Characterization of Radio-Waste from TRIGA II Research Reactor and Assessment of Corresponding Radiation Dose in Bangladesh Analysis of Forward Kinematics of 2R Robotic Arm Development of Bi-Stable Vibration Energy Harvesting System Using Duffing-Type Motion Model
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1