• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

预防内部威胁的技术与对策。

Techniques and countermeasures for preventing insider threats.

作者信息

Alsowail Rakan A, Al-Shehari Taher

机构信息

Computer Skills, Self-Development Department, Deanship of Common First Year, King Saud University, Riyadh, Saudi Arabia.

出版信息

PeerJ Comput Sci. 2022 Apr 1;8:e938. doi: 10.7717/peerj-cs.938. eCollection 2022.

DOI:10.7717/peerj-cs.938
PMID:35494800
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9044369/
Abstract

With the wide use of technologies nowadays, various security issues have emerged. Public and private sectors are both spending a large portion of their budget to protect the confidentiality, integrity, and availability of their data from possible attacks. Among these attacks are insider attacks which are more serious than external attacks, as insiders are authorized users who have legitimate access to sensitive assets of an organization. As a result, several studies exist in the literature aimed to develop techniques and tools to detect and prevent various types of insider threats. This article reviews different techniques and countermeasures that are proposed to prevent insider attacks. A unified classification model is proposed to classify the insider threat prevention approaches into two categories (biometric-based and asset-based metric). The biometric-based category is also classified into (physiological, behavioral and physical), while the asset metric-based category is also classified into (host, network and combined). This classification systematizes the reviewed approaches that are validated with empirical results utilizing the grounded theory method for rigorous literature review. Additionally, the article compares and discusses significant theoretical and empirical factors that play a key role in the effectiveness of insider threat prevention approaches (e.g., datasets, feature domains, classification algorithms, evaluation metrics, real-world simulation, stability and scalability, ). Major challenges are also highlighted which need to be considered when deploying real-world insider threat prevention systems. Some research gaps and recommendations are also presented for future research directions.

摘要

如今,随着技术的广泛应用,各种安全问题层出不穷。公共部门和私营部门都在将其预算的很大一部分用于保护其数据的保密性、完整性和可用性,使其免受可能的攻击。这些攻击中包括内部人员攻击,这种攻击比外部攻击更为严重,因为内部人员是被授权的用户,能够合法访问组织的敏感资产。因此,文献中有几项研究旨在开发检测和预防各种类型内部威胁的技术和工具。本文回顾了为防止内部人员攻击而提出的不同技术和对策。提出了一个统一的分类模型,将内部威胁预防方法分为两类(基于生物特征的和基于资产指标的)。基于生物特征的类别又分为(生理的、行为的和物理的),而基于资产指标的类别也分为(主机、网络和组合的)。这种分类对所审查的方法进行了系统化整理,这些方法通过扎根理论方法进行严格的文献综述,并得到了实证结果的验证。此外,本文还比较和讨论了在内部威胁预防方法有效性方面起关键作用的重要理论和实证因素(例如,数据集、特征域、分类算法、评估指标、现实世界模拟、稳定性和可扩展性)。还强调了在部署实际的内部威胁预防系统时需要考虑的主要挑战。同时也提出了一些研究空白和建议,以供未来的研究方向参考。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/eaf7/9044369/cfc03a275893/peerj-cs-08-938-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/eaf7/9044369/52fbc44ee8a5/peerj-cs-08-938-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/eaf7/9044369/7e08a66c563d/peerj-cs-08-938-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/eaf7/9044369/d734a33578d9/peerj-cs-08-938-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/eaf7/9044369/20f6105fe43b/peerj-cs-08-938-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/eaf7/9044369/cfc03a275893/peerj-cs-08-938-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/eaf7/9044369/52fbc44ee8a5/peerj-cs-08-938-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/eaf7/9044369/7e08a66c563d/peerj-cs-08-938-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/eaf7/9044369/d734a33578d9/peerj-cs-08-938-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/eaf7/9044369/20f6105fe43b/peerj-cs-08-938-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/eaf7/9044369/cfc03a275893/peerj-cs-08-938-g005.jpg

相似文献

1
Techniques and countermeasures for preventing insider threats.预防内部威胁的技术与对策。
PeerJ Comput Sci. 2022 Apr 1;8:e938. doi: 10.7717/peerj-cs.938. eCollection 2022.
2
An Insider Data Leakage Detection Using One-Hot Encoding, Synthetic Minority Oversampling and Machine Learning Techniques.一种使用独热编码、合成少数过采样技术和机器学习技术的内部数据泄露检测方法。
Entropy (Basel). 2021 Sep 27;23(10):1258. doi: 10.3390/e23101258.
3
Tracking the Insider Attacker: A Blockchain Traceability System for Insider Threats.追踪内部威胁者:一种用于内部威胁的区块链可追溯性系统。
Sensors (Basel). 2020 Sep 16;20(18):5297. doi: 10.3390/s20185297.
4
Sorting Insiders From Co-Workers: Remote Synchronous Computer-Mediated Triage for Investigating Insider Attacks.从同事中甄别内鬼:用于调查内部攻击的远程同步计算机中介分诊。
Hum Factors. 2024 Jan;66(1):145-157. doi: 10.1177/00187208211068292. Epub 2022 Mar 7.
5
An Investigation of Insider Threat Mitigation Based on EEG Signal Classification.基于脑电信号分类的内部威胁缓解研究。
Sensors (Basel). 2020 Nov 8;20(21):6365. doi: 10.3390/s20216365.
6
Real-Time Remote Health Monitoring Systems Using Body Sensor Information and Finger Vein Biometric Verification: A Multi-Layer Systematic Review.基于体传感器信息和指静脉生物特征验证的实时远程健康监测系统:一项多层次系统评价。
J Med Syst. 2018 Oct 16;42(12):238. doi: 10.1007/s10916-018-1104-5.
7
A Survey of Authentication Schemes in Telecare Medicine Information Systems.远程医疗信息系统中的认证方案调查
J Med Syst. 2017 Jan;41(1):14. doi: 10.1007/s10916-016-0658-3. Epub 2016 Nov 30.
8
A Pilot Examination of the Methods Used to Counteract Insider Threat Security Risks Associated with the Use of Radioactive Materials in the Research and Clinical Setting.针对研究和临床环境中与使用放射性材料相关的内部威胁安全风险所采用的应对方法的初步检验。
Health Phys. 2018 Mar;114(3):352-359. doi: 10.1097/HP.0000000000000808.
9
Efficient certificate-based signcryption secure against public key replacement attacks and insider attacks.针对公钥替换攻击和内部攻击具有安全性的高效基于证书的签密。
ScientificWorldJournal. 2014;2014:295419. doi: 10.1155/2014/295419. Epub 2014 May 12.
10
A Fusion Model Based on Dynamic Web Browsing Behavior Analysis for IoT Insider Threat Detection.基于动态网页浏览行为分析的物联网内部威胁检测融合模型。
Sensors (Basel). 2022 Aug 28;22(17):6471. doi: 10.3390/s22176471.

引用本文的文献

1
Integrating machine learning for sustaining cybersecurity in digital banks.整合机器学习以维持数字银行的网络安全。
Heliyon. 2024 Sep 6;10(17):e37571. doi: 10.1016/j.heliyon.2024.e37571. eCollection 2024 Sep 15.

本文引用的文献

1
Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems.使用多策略访问控制系统限制内部人员访问的线性时间算法。
J Wirel Mob Netw Ubiquitous Comput Dependable Appl. 2017 Mar;8(1):4-25.
2
Detecting Anomalous Insiders in Collaborative Information Systems.检测协作信息系统中的异常内部人员。
IEEE Trans Dependable Secure Comput. 2012 May;9(3):332-344. doi: 10.1109/TDSC.2012.11.
3
Eeglab - an Open Source Matlab Toolbox for Electrophysiological Research.Eeglab——一款用于电生理研究的开源Matlab工具箱。
Biomed Tech (Berl). 2013 Aug;58 Suppl 1. doi: 10.1515/bmt-2013-4182. Epub 2013 Sep 7.
4
Integrating text and pictorial information: eye movements when looking at print advertisements.整合文字与图片信息:观看平面广告时的眼动情况
J Exp Psychol Appl. 2001 Sep;7(3):219-26. doi: 10.1037//1076-898x.7.3.219.