期刊文献+

利用访问向量的内部威胁感知方法 被引量:5

Sensing insider threat based on access vectors
下载PDF
导出
摘要 利用系统访问控制关系,定义了层次化访问控制模型和访问向量,建立了信息系统资源内部威胁特征的量化方法,利用访问向量实现了信息系统访问行为的内部威胁特征量化,并以此为基础,建立了系统内部威胁实时感知方法,实现了对系统内部威胁的全面实时评估,克服了原有模型依赖于先验知识的不足,提高了量化的准确性和客观性.仿真实验结果表明,利用访问向量的内部威胁感知方法能够实时、有效地评估系统的内部安全威胁,为进一步实现内部威胁的态势感知建立了基础. The hierarchy-based access control model and access vectors are defined by using the access control relationship. A method is developed for quantizing the insider threat on resources and actions in the information system. Then a full real time assessment is obtained by using access vectors. Compared with other models, this model improves the precision and objectivity of the quantization without a prior knowledge of the system. Experimental results show that the access vector based on the hand hierarchy- based access control model can effectively assess the insider threat in real-time and can be used to build the insider threat sense system.
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2014年第1期110-115,共6页 Journal of Xidian University
基金 国家自然科学基金资助项目(61300120) 航空科学基金资助项目(20101981015 2010ZC31002 2010ZC31001 2011ZC31006) 新世纪优秀人才支持计划资助项目(NCET-11-0691) 中央高校基本科研业务费专项资金资助项目(K50511010003) 陕西省自然科学基础研究计划资助项目(2010JQ8018) 教育部人文社会科学研究资助项目(12YJC630038) 河北省自然科学基金资助项目(F2013208137) 河北科技大学博士科研基金资助项目(QD201035 001041) 河北省高等学校科学技术研究资助项目(ZD20131016 YQ2013032)
关键词 内部威胁 感知 访问控制 向量 insider threat assessment access control vector
  • 相关文献

参考文献14

  • 1Schultz E. A Framework for Understanding and Predicting Insider Attacks [J] . Computer and Security, 2002, 21(6): 526-531. 被引量:1
  • 2中国电信网络安全实验室编著..云计算安全 技术与应用[M].北京:电子工业出版社,2012:222.
  • 3Greitzer F L, Moore A P, Cappelli D M, et al. Combating the Insider Cyber Threat [J]. IEEE Security and Privacy, 2008, 6(1): 61-64. 被引量:1
  • 4Lee W, Stolfo S, Chan P, et al. Real Time Data Mining-based Intrusion Detection[C]//Proceedings of the 2001 DARPA Information Survivability Conference and Exposition I] . Los Alamito: IEEE Computer Society, 2001: 89-100. 被引量:1
  • 5Singhal A. Data Warehousing and Data Mining Techniques for Computer Security[M] New York: Springer-Verlag, 2006: 83-103. 被引量:1
  • 6Ertoz L, Eilertson E, Lazarevic A, et al. MINDS-Minnesota Intrusion Detection System[C]//Next Generation Data Mining. New York: MIT/AAAI Press, 2004: 65-86. 被引量:1
  • 7Buford J, Lewis L, Jakobson G. Insider Threat Detection Using Situation-aware MAS [C] //Proceedings of the llth International Conference on Information Fusion. Piscataway: IEEE Press, 2008. 被引量:1
  • 8Wang Hui, Liu Shufen, Zhang Xinjia. A Prediction Model of Insider Threat Based on Multi-agent [C]//Proceedings of the 1st International Symposium on Pervasive Computing and Applications. Piscataway: IEEE Computer Society, 2006: 273-278. 被引量:1
  • 9Anderson D, f,unt T, Javitz H, et al, Detecting Unusual Program Behavior Using the Statistical Component of the Next Generation Intrusion Detection Expert System (NIDES) [R/OL]. [2012-10-07]. http://www, sdl. sri. com/papers/ 5sri/5sri. pdf. 被引量:1
  • 10Santos E, Nguyen H, Yu F, et al. Intent-driven Insider Threat Detection in Intelligence Analyses[C]//Proceedings of the IEEE/WIC/ACM International Conference on Intelligent Agent Technology. Piscataway: IEEE Computer Society, 2008: 345-349. 被引量:1

二级参考文献18

  • 1陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:342
  • 2Schultz E. A Framework for Understanding and Predicting Insider Attacks[J]. Computer and Security, 2002, 21(6): 526-531. 被引量:1
  • 3Wood B. An Insider Threat Model for Adversary Simulation[C]//The Proceedings of a Workshop with Title "Esearch on Mitigating the Insider Threat to Information Systems". Arlington: Rand, 2000: 41-48. 被引量:1
  • 4Parker D B. Fighting Computer Crime: a New Framework for Protecting Information[R]. New York: John Wiley and Sons, 1998. 被引量:1
  • 5Park J S, Ho S M. Composite Role-based Monitoring (CRBM) for Countering Insider Threats[C]//Proceedings of the Second Symposium on Intelligence and Security Informatics. Berlin: Springer, 2004: 201-213. 被引量:1
  • 6Ray I, Petolsapassit N. Using Attack Trees to Identify Malicious Attacks from Authorized Insiders[C]//Proeeedings of the 10th European Symposium on Research in Computer Security. Berlin: Springer, 2005: 231-246. 被引量:1
  • 7Satty T L. The Analytic Hierarchy Proeess[M]. New York: McGraw-Hill, 1980. 被引量:1
  • 8Birget J-C, Zou X, Noubir G, et al. Hierarchy-based Access Control in Distributed Environments[C]//Proceedings of 2001 IEEE International Conference on Communications. Helsinki: IEEE, 2001: 229-233. 被引量:1
  • 9Cole E, Ring S. Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft. Rockland, MA: Syngress, 2005 被引量:1
  • 10Pfleeger C P. Reflections on the Insider Threat, Insider Attack and Cyber Security. Springer, 2008:5-16 被引量:1

共引文献15

同被引文献27

引证文献5

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部