Designing Host and Network Sensors to Mitigate the Insider Threat

  • Authors:
  • Brian Bowen;Malek Ben Salem;Shlomo Hershkop;Angelos Keromytis;Salvatore Stolfo

  • Affiliations:
  • Columbia University, New York;Columbia University, New York City;Columbia University, New York;Columbia University, New York City;Columbia University, New York City

  • Venue:
  • IEEE Security and Privacy
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Insider attacks—that is, attacks by users with privileged knowledge about a system—are a growing problem for many organizations. To address this threat, the authors propose a design for insider threat detection that combines an array of complementary techniques that aims to detect evasive adversaries. The authors' work-in-progress combines host-based user event monitoring sensors with trap-based decoys and remote network detectors to track and correlate insider activity. They identify several challenges in scaling up, deploying, and validating this architecture in real environments.