期刊文献+

基于用户操作树的内部威胁检测模型 被引量:1

Insider threat detection model based on operation tree
下载PDF
导出
摘要 企业组织网络所面临的威胁不仅来自外部,而且也来自内部,而内部威胁(Insider Threat)已被认为是一个非常严重的安全问题。现在,内部威胁分析检测工具方面的研究仍处于探索阶段,笔者提出一种新颖的基于用户操作树的内部威胁检测模型。该模型依据用户对系统的操作,定制生成该用户的操作树,通过分析用户操作树可以预测内部威胁的存在。 Threats that business corporations are facing come from not only the outsider, but also the insider. Nowadays,insider threats are widely recognized as an issue of ulmost importance for security management. However, the development of assessing instrument for discovery and analysis of insider threats is still in an explore stage. The present study provides a novel model for detecting insider threats. This model offers a minimal operation tree on the basis of the specific operation system of the customer. And this model can detect the operation behaviors of the insider in the real time, and make decisions to insider threats.
作者 崔鹏 姚丹霖
出处 《河北省科学院学报》 CAS 2008年第1期10-14,共5页 Journal of The Hebei Academy of Sciences
关键词 内部用户 用户操作树 最小操作树 用户操作轨迹串 Insider Operation tree Minimal operation tree Operation trace
  • 相关文献

参考文献5

二级参考文献32

  • 1陈爱平.内部信息行为监管方法[J].计算机安全,2005(8):53-54. 被引量:2
  • 2覃东,黄晓波,王新桥.代理在计算机网络安全中的应用分析[J].信息安全与通信保密,2006(3):94-95. 被引量:2
  • 3王辉,刘淑芬.一种可扩展的内部威胁预测模型[J].计算机学报,2006,29(8):1346-1355. 被引量:22
  • 4Marianthi T. et al,. The insider threat to information systems and the effectiveness of ISO17799. Computers & Security,2005, 24(6): 472-484 被引量:1
  • 5Magklaras G. B. , Furnell S. M.. A preliminary model of end user sophistication for insider threat prediction in IT systems.Computers & Security, 2005, 24(5): 371-380 被引量:1
  • 6Mike K.. Barbarians inside the gates: Addressing internal security threats. Network Security, 2005, (6): 11-13 被引量:1
  • 7Yu Y. , Chiueh T. C.. Display-only file server: A solution against information theft due to insider attack. In: Proceedings of the 4th ACM Workshop on Digital Rights Management,2004, 31-39 被引量:1
  • 8Wood B.. An insider threat model for adversary simulation.In: Proceedings of the Workshop with Title "Research on Mitigating the Insider Threat to Information Systems", Arlington VA, 2000 被引量:1
  • 9Schultz E. E.. A framework for understanding and predicting insider attacks. Computers and Security, 2002, 21(6) : 526-531 被引量:1
  • 10Magklaras G. B. , Furnell S. M.. Insider threat prediction tool:Evaluating the probability of IT misuse. Computers & Security,2002, 21(1): 62-73 被引量:1

共引文献23

同被引文献16

引证文献1

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部