Academic literature on the topic 'Insider attacks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Insider attacks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Insider attacks"

1

Henge, Santosh Kumar, Aditya Upadhyay, Ashok Kumar Saini, Neha Mishra, Dimpal Sharma, and Gajanand Sharma. "Analysis and detection of insider attacks using behaviour rule based architecture in enterprise multitenancy." Journal of Discrete Mathematical Sciences & Cryptography 26, no. 3 (2023): 707–18. http://dx.doi.org/10.47974/jdmsc-1743.

Full text
Abstract:
The enterprise level data security and privacy are one of the focal key challenges to the pr enterprise and security companies to prevent private data from outside and inside attacks. The insider threats and attacks can pretense a real defense risk to the various internal multi-tenants of various enterprises and companies. The data thievery by insiders of the companies is as a great deal the consequence of enterprises failing to execute the scheme and expertise to member of staff supervise activities and administrate the authenticated data-access to data as it the authentic spiteful activities of member of staff looking for economic benefits in multi-tenancy environment. This research composed with three major objectives: Description of insider attack causes with their impact factors; Implications of behavior rule-based architecture in enterprise multitenancy; Integration of behavior rules with prevention thresholds to control user accessibility for prevention of insider attacks and threats; This paper has described the efficient security scenario to avoid insider attaching complexities. This research is more helping the cyber security experts and network administrators to reduce the insider attacks by building the efficient monitoring intelligent system. The experimental scenarios built with125 authenticated, 29 non-authenticated internal users, and 62 authenticated, 18 non-authenticated external users of single enterprise level and avoided insider attacks and threats.
APA, Harvard, Vancouver, ISO, and other styles
2

Nguyen, Minh-Duong, Ngoc-Tu Chau, Seungwook Jung, and Souhwan Jung. "A Demonstration of Malicious Insider Attacks inside Cloud IaaS Vendor." International Journal of Information and Education Technology 4, no. 6 (2014): 483–86. http://dx.doi.org/10.7763/ijiet.2014.v4.455.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Glancy, Fletcher, David P. Biros, Nan Liang, and Andy Luse. "Classification of malicious insiders and the association of the forms of attacks." Journal of Criminal Psychology 10, no. 3 (2020): 233–47. http://dx.doi.org/10.1108/jcp-03-2020-0012.

Full text
Abstract:
Purpose The authors argue that the current studies about malicious insiders confuse the fact that malicious attacks belong to two different categories, namely, those that launch instrumental attacks and expressive attacks. The authors collect malicious insider data from publicly available sources and use text-mining techniques to analyze the association between malicious insiders’ characteristics and the different types of attack. Design/methodology/approach The authors investigated the relationship between personality characteristics and different types of malicious attacks. For the personality characteristics, the authors use the same method as Liang et al. (2016), which extracted these characteristics based on a keyword-characteristic dictionary. For different types of malicious attacks, two raters rated each case based on criteria modified from criminology research to determine the degree of expressiveness and instrumentality. Findings The results show that malicious insiders who are manipulative or seeking personal gain tend to carry out instrumental attacks. Malicious insiders who are arrogant tend to conduct expressive attacks. Research limitations/implications This study uses third party articles to identify the personality characteristics of known malicious insiders. As such, not all personality characteristics may have been reported. Data availability was an issue. Practical implications Understanding if different personality characteristics lead different types of attacks can help managers identify employees who exhibit them and mitigate an attack before it occurs. Social implications Malicious insider attacks can have devastating results on businesses and employees. Help to identify potential malicious insiders before they act, may prevent undue harm. Originality/value This study used 132 cases of none malicious insiders to examine their attack objectives. No other study that the authors know of used that many cases.
APA, Harvard, Vancouver, ISO, and other styles
4

M, Rama Bai, and Bin Saad Quraishi Maaz. "Privacy Protection Against Insider Attacks." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 5 (2020): 576–78. https://doi.org/10.35940/ijeat.E9744.069520.

Full text
Abstract:
A growing number of public and private sector organizations are recognizing insider threats as a critical area. In response, many steps are taken to defend assets against risks posed by employees and third-party trust. Insiders pose unique challenges for defenders. Traditional security tools are unlikely to audit insiders, let alone privileged users who have a potentially malicious intent. Although a high-risk activity, it is common to see users sharing passwords between colleagues or subordinates, defeating the purpose of authentication. This increases chances of Insider Attacks (IA), as it is hard to identify malicious insiders, given an attacker is entrusted with highly privileged access to read and write operations. Information Technology Organizations employ many workers with varying level of access, and every user is authenticated with unique login credenti¬als. Controls need to be put in place in order to secure the systems, since it can hamper login patterns. Research indicates that by analysis of system calls (SCs) that are generated upon user login can detect intrusions and read such patterns that are against the normal operations of the system. Information Technology Organizations employ many workers with varying level of access, and no two users have same login behavior. Given every user has a unique login pattern, this work proposes a system called Privacy Protection Against Insider Attacks (PPIA) which learns the login pattern of each user that is authenticated and employs data mining concepts to read user behavior and endeavors to detect insider attacks .Experimental results indicate that the approach is very effective and accurate.
APA, Harvard, Vancouver, ISO, and other styles
5

Al-Shehari, Taher, and Rakan A. Alsowail. "An Insider Data Leakage Detection Using One-Hot Encoding, Synthetic Minority Oversampling and Machine Learning Techniques." Entropy 23, no. 10 (2021): 1258. http://dx.doi.org/10.3390/e23101258.

Full text
Abstract:
Insider threats are malicious acts that can be carried out by an authorized employee within an organization. Insider threats represent a major cybersecurity challenge for private and public organizations, as an insider attack can cause extensive damage to organization assets much more than external attacks. Most existing approaches in the field of insider threat focused on detecting general insider attack scenarios. However, insider attacks can be carried out in different ways, and the most dangerous one is a data leakage attack that can be executed by a malicious insider before his/her leaving an organization. This paper proposes a machine learning-based model for detecting such serious insider threat incidents. The proposed model addresses the possible bias of detection results that can occur due to an inappropriate encoding process by employing the feature scaling and one-hot encoding techniques. Furthermore, the imbalance issue of the utilized dataset is also addressed utilizing the synthetic minority oversampling technique (SMOTE). Well known machine learning algorithms are employed to detect the most accurate classifier that can detect data leakage events executed by malicious insiders during the sensitive period before they leave an organization. We provide a proof of concept for our model by applying it on CMU-CERT Insider Threat Dataset and comparing its performance with the ground truth. The experimental results show that our model detects insider data leakage events with an AUC-ROC value of 0.99, outperforming the existing approaches that are validated on the same dataset. The proposed model provides effective methods to address possible bias and class imbalance issues for the aim of devising an effective insider data leakage detection system.
APA, Harvard, Vancouver, ISO, and other styles
6

Soleh, Musdi Muhammad. "A Study Case in NTMC POLRI: Reducing Data Breach Risk from Insider Threats by Using Risk IT Framework." ACMIT Proceedings 3, no. 1 (2019): 171–79. http://dx.doi.org/10.33555/acmit.v3i1.41.

Full text
Abstract:
Risks is not only merely comes from external threats, it is also comes from inside - internal actor. Vormetric Insider Threat mentioned that in 800 surveyed enterprise companies, 89% vulnerable to insider attacks [1]. It mentioned that Data Breach issue the highest risk happened to the company caused by insider threats. This paper will analyse the insider attacks, Risk IT framework will be used toreduce to reduce and prevent these vulnerabilities in valuable assets.
APA, Harvard, Vancouver, ISO, and other styles
7

Lynch, David M. "Securing Against Insider Attacks." EDPACS 34, no. 1 (2006): 10–20. http://dx.doi.org/10.1201/1079.07366981/46107.34.1.20060701/93701.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lynch, David M. "Securing Against Insider Attacks." Information Systems Security 15, no. 5 (2006): 39–47. http://dx.doi.org/10.1201/1086.1065898x/46353.15.4.20060901/95430.6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Abulencia, Jesse. "Insider attacks: human-factors attacks and mitigation." Computer Fraud & Security 2021, no. 5 (2021): 14–17. http://dx.doi.org/10.1016/s1361-3723(21)00054-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Nasraddin, Jehan Turki, Eynas Hassan Balkhair, and Dr Manar Salamh. "Detection of Malicious Privileged Access Using a RuleBased Approach." International Journal of Engineering Research and Applications 14, no. 10 (2024): 63–72. http://dx.doi.org/10.9790/9622-14106372.

Full text
Abstract:
Privilege insiders are harder to detect by organizations. An organization's systems are subjected to threats that will affect missions, assets, and individuals of the organization. Many organizations affected by threats over a year. This paper modeled the path of actors that aims to publish and share sensitive data of the company such as files to unauthorized users by insider attack by using State Transition Diagram and developed detection of the modeled insider attack paths using the rule-based approach. There are seventy-seven attack steps that can be taken to achieve goals of publishing and sharing sensitive company files which are done by an insider attack. After deep studying of the attacks steps, the designed diagram has layered the attack steps based on analysis and aggregated them to five groups. This paper also uses offline analysis, which use the log file after the attack occurred, publish process is not affected in offline analysis. Rules and pseudocode are explained in detail.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Insider attacks"

1

Nsambu, Emmanuel, and Danish Aziz. "The Defense Against the latest Cyber Espionage both insider and outsider attacks." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-16477.

Full text
Abstract:
This study was carried out with the intention of examining the defensive mechanism employed against the latest cyber espionage methods including both insider and outsider attacks. The main focus of this study was on web servers as the targets of the cyber attacks. Information in connection to the study was obtained from researchers’ online articles. A survey was also conducted at MidSweden University in order to obtain information about the latest cyber attacks on web servers and about the existing defensive mechanism against such attacks. The existing defensive mechanism was surveyed and a simple design was created to assist in the investigation of the efficiency of the system. Some simple implementations of the existing defensive mechanism were made in order to provide some practical results that were used for the study. The existing defensive mechanism was surveyed and improved upon where possible. The improved defensive mechanism was designed and implemented and its results were compared with the results from the existing defensive mechanism. Due to the fact that the majority of the attackers use defensive mechanisms’ vulnerability in order to find their way into devices such as web servers, it was felt that, even with the most sophisticated improved defensive mechanism in place, it would not be entirely correct to claim that it is possible to fully protect web servers against such attacks.
APA, Harvard, Vancouver, ISO, and other styles
2

Doss, Gary. "An Approach to Effectively Identify Insider Attacks within an Organization." NSUWorks, 2012. http://nsuworks.nova.edu/gscis_etd/138.

Full text
Abstract:
The purpose of this research is to identify the factors that influence organizational insiders to violate information security policies. There are numerous accounts of successful malicious activities conducted by employees and internal users of organizations. Researchers and organizations have begun looking at methods to reduce or mitigate the insider threat problem. Few proposed methods and models to identify, deter, and prevent the insider threat are based on empirical data. Additionally, few studies have focused on the targets or goals of the insider with organizational control as a foundation. From a target perspective, an organization might be able to control the outcome of a malicious insider threat attack. This research applied a criminology lens as an organization policy violation is, or resembles, a criminal activity. This research uses the Routine Activities Theory (RAT) as a guide to develop a theoretical model. The adoption of RAT was for its focus on the target and the protective controls, while still taking into account the motivated offender. The study identified the components of the model concerning insider threats, espionage, and illicit behavior related to information systems through literature. This led to the development of 10 hypotheses regarding the relationships of key factors that influence malicious insider activity. Data was collected using a scenario-based survey, which allowed for impartial responses from a third-person perspective. This technique has become popular in the field of criminology, as the effects of social desirability, acceptance, or repudiation will not be a concern. A pilot test verified the survey's ability to collect the appropriate data. The research employed Structural Equation Modeling (SEM) and Confirmatory Factor Analysis (CFA) techniques to analyze and evaluate the data. SEM and CFA techniques identified the fit of the model and the factors that influence information security policy violations. The result of the analysis provided criteria to accept the hypotheses and to identify key factors that influence insider Information System policy violations. This research identified the relationships and the level of influence between each factor.
APA, Harvard, Vancouver, ISO, and other styles
3

Usmani, Wali Ahmed. "Not able to resist the urge : social insider attacks on Facebook." Thesis, University of British Columbia, 2016. http://hdl.handle.net/2429/60294.

Full text
Abstract:
Facebook accounts are secured against unauthorized access through passwords, and through device-level security. Those defenses, however, may not be sufficient to prevent social insider attacks, where attackers know their victims, and gain access to their accounts using the victim's device. To characterize these attacks, we ran two Amazon Mechanical Turk studies geographically restricting participant pool to US only. Our major goal was to establish social insider attack prevalence and characteristics to justify a call to action for better protective and preventative countermeasures against it. In the first study involving 1308 participants, we used the list experiment, a quantitative method to estimate that 24% of participants had perpetrated social insider attacks, and that 21% had been victims to it (and knew about it). In the second, qualitative study with 45 participants, we collected stories detailing personal experiences with such attacks. Using thematic analysis, we typified attacks around 5 motivations (fun, curiosity, jealousy, animosity and utility), and explored dimensions associated with each type. Our combined findings indicate a number of trends in social insider attacks. We found that they are common, they can be perpetrated by almost all social relations and often have serious emotional consequences. Effective mitigation would require a variety of approaches as well as better user awareness. Based on the results of our experiments, we propose methodological steps to study the perception of severity of social insider attacks. In this procedure, we include an experimental design of the study and its possible limitations. The study consists of presenting stories collected in the previously mentioned second study to a new cohort of participants. It the asks them to provide a Likert Scale rating and justification for how severe they perceive the attack in the story to be if they were the victim as well as how likely they feel they might be a victim to such an attack. Lastly, we discuss possible future work in creating countermeasures to social insider attacks, their viability and limitations. We conclude that no single technique is complete solution. Instead mitigation will require a number of techniques in combination to be effective.<br>Science, Faculty of<br>Computer Science, Department of<br>Graduate
APA, Harvard, Vancouver, ISO, and other styles
4

Aditham, Santosh. "Mitigation of Insider Attacks for Data Security in Distributed Computing Environments." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6639.

Full text
Abstract:
In big data systems, the infrastructure is such that large amounts of data are hosted away from the users. Information security is a major challenge in such systems. From the customer’s perspective, one of the big risks in adopting big data systems is in trusting the service provider who designs and owns the infrastructure, with data security and privacy. However, big data frameworks typically focus on performance and the opportunity for including enhanced security measures is limited. In this dissertation, the problem of mitigating insider attacks is extensively investigated and several static and dynamic run-time techniques are developed. The proposed techniques are targeted at big data systems but applicable to any data system in general. First, a framework is developed to host the proposed security techniques and integrate with the underlying distributed computing environment. We endorse the idea of deploying this framework on special purpose hardware and a basic model of the software architecture for such security coprocessors is presented. Then, a set of compile-time and run-time techniques are proposed to protect user data from the perpetrators. These techniques target detection of insider attacks that exploit data and infrastructure. The compile-time intrusion detection techniques analyze the control flow by disassembling program binaries while the run-time techniques analyze the memory access patterns of processes running on the system. The proposed techniques have been implemented as prototypes and extensively tested using big data applications. Experiments were conducted on big data frameworks such as Hadoop and Spark using cloud-based services. Experimental results indicate that the proposed techniques successfully detect insider attacks in the context of data loss, data degradation, data exposure and infrastructure degradation.
APA, Harvard, Vancouver, ISO, and other styles
5

JUNG, SANG SHIN. "Attacking and Securing Beacon-Enabled 802.15.4 Networks." Digital Archive @ GSU, 2011. http://digitalarchive.gsu.edu/cs_theses/74.

Full text
Abstract:
The IEEE 802.15.4 has attracted time-critical applications in wireless sensor networks (WSNs) because of its beacon-enabled mode and guaranteed timeslots (GTSs). However, the GTS scheme’s security still leave the 802.15.4 MAC vulnerable to attacks. Further, the existing techniques in the literature for securing 802.15.4 either focus on non beacon-enabled 802.15.4 or cannot defend against insider attacks for beacon-enabled 802.15.4. In this thesis, we illustrate this by demonstrating attacks on the availability and integrity of the beacon-enabled 802.15.4. To proof the attacks, we implement the attacks using Tmote Sky motes for a malicious node along with regular nodes. We show that the malicious node can freely exploit the beacon frames to compromise the integrity and availability of the network. For the defense, we present beacon-enabled MiniSec (BCN-MiniSec) and analyze its cost.
APA, Harvard, Vancouver, ISO, and other styles
6

Kambhampaty, Krishna Kanth. "Detecting Insider and Masquerade Attacks by Identifying Malicious User Behavior and Evaluating Trust in Cloud Computing and IoT Devices." Diss., North Dakota State University, 2019. https://hdl.handle.net/10365/29914.

Full text
Abstract:
There are a variety of communication mediums or devices for interaction. Users hop from one medium to another frequently. Though the increase in the number of devices brings convenience, it also raises security concerns. Provision of platform to users is as much important as its security. In this dissertation we propose a security approach that captures user behavior for identifying malicious activities. System users exhibit certain behavioral patterns while utilizing the resources. User behaviors such as device location, accessing certain files in a server, using a designated or specific user account etc. If this behavior is captured and compared with normal users? behavior, anomalies can be detected. In our model, we have identified malicious users and have assigned trust value to each user accessing the system. When a user accesses new files on the servers that have not been previously accessed, accessing multiple accounts from the same device etc., these users are considered suspicious. If this behavior continues, they are categorized as ingenuine. A trust value is assigned to users. This value determines the trustworthiness of a user. Genuine users get higher trust value and ingenuine users get a lower trust value. The range of trust value varies from zero to one, with one being the highest trustworthiness and zero being the lowest. In our model, we have sixteen different features to track user behavior. These features evaluate users? activities. From the time users? log in to the system till they log out, users are monitored based on these sixteen features. These features determine whether the user is malicious. For instance, features such as accessing too many accounts, using proxy servers, too many incorrect logins attribute to suspicious activity. Higher the number of these features, more suspicious is the user. More such additional features contribute to lower trust value. Identifying malicious users could prevent and/or mitigate the attacks. This will enable in taking timely action against these users from performing any unauthorized or illegal actions. This could prevent insider and masquerade attacks. This application could be utilized in mobile, cloud and pervasive computing platforms.
APA, Harvard, Vancouver, ISO, and other styles
7

Radhouani, Amira. "Méthodes formelles pour l'extraction d'attaques internes des Systèmes d'Information." Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAM025/document.

Full text
Abstract:
La sécurité des Systèmes d’Information (SI) constitue un défi majeur car elle conditionne amplement la future exploitation d’un SI. C’est pourquoi l’étude des vulnérabilités d’un SI dès les phases conceptuelles est cruciale. Il s’agit d’étudier la validation de politiques de sécurité, souvent exprimées par des règles de contrôle d’accès, et d’effectuer des vérifications automatisées sur des modèles afin de garantir une certaine confiance dans le SI avant son opérationnalisation. Notre intérêt porte plus particulièrement sur la détection des vulnérabilités pouvant être exploitées par des utilisateurs internes afin de commettre des attaques, appelées attaques internes, en profitant de leur accès légitime au système. Pour ce faire, nous exploitons des spécifications formelles B générées, par la plateforme B4MSecure, à partir de modèles fonctionnels UML et d’une description Secure UML des règles de contrôle d’accès basées sur les rôles. Ces vulnérabilités étant dues à l’évolution dynamique de l’état fonctionnel du système, nous proposons d’étudier l’atteignabilité des états, dits indésirables, donnant lieu à des attaques potentielles, à partir d’un état normal du système. Les techniques proposées constituent une alternative aux techniques de model-checking. En effet, elles mettent en œuvre une recherche symbolique vers l’arrière fondée sur des approches complémentaires : la preuve et la résolution de contraintes. Ce processus de recherche est entièrement automatisé grâce à notre outil GenISIS qui a montré, sur la base d’études de cas disponibles dans la littérature, sa capacité à retrouver des attaques déjà publiées mais aussi des attaques nouvelles<br>The early detection of potential threats during the modelling phase of a Secure Information System (IS) is required because it favours the design of a robust access control policy and the prevention of malicious behaviours during the system execution. This involves studying the validation of access control rules and performing vulnerabilities automated checks before the IS operationalization. We are particularly interested in detecting vulnerabilities that can be exploited by internal trusted users to commit attacks, called insider attacks, by taking advantage of their legitimate access to the system. To do so, we use formal B specifications which are generated by the B4MSecure platform from UML functional models and a SecureUML modelling of role-based access control rules. Since these vulnerabilities are due to the dynamic evolution of the functional state, we propose to study the reachability of someundesirable states starting from a normal state of the system. The proposed techniques are an alternative to model-checking techniques. Indeed, they implement symbolic backward search algorithm based on complementary approaches: proof and constraint solving. This rich technical background allowed the development of the GenISIS tool which automates our approach and which was successfully experimented on several case studies available in the literature. These experiments showed its capability to extract already published attacks but also new attacks
APA, Harvard, Vancouver, ISO, and other styles
8

Krauß, Christoph. "Handling Insider Attacks in Wireless Sensor Networks." Phd thesis, 2010. https://tuprints.ulb.tu-darmstadt.de/2158/1/Dissertation_ckrauss.pdf.

Full text
Abstract:
Wireless sensor networks are a relatively new technology for information gathering and processing. A sensor network usually consists of many, resource constrained sensor nodes. These nodes perform measurements of some physical phenomena, process data, generate reports, and send these reports via multihop communication to a central information processing unit called sink. Depending on the scenario, information gathering and processing is collaboratively performed by multiple sensor nodes, e.g., to determine the average temperature in a certain area. Sensor networks can be used in a plethora of application scenarios. Emerging from military research, e.g., sensor networks for target tracking in a battlefield, sensor networks are nowadays used more and more in civil applications such as critical infrastructure monitoring. For ensuring the functionality of a sensor network, especially in malicious environments, security mechanisms are essential for all sensor networks. However, sensor networks differ from classical (wireless) networks and this consequently makes it harder to secure them. Reasons for this are resource constraints of the sensor nodes, the wireless multihop communication, and the possibility of node compromise. Since sensor nodes are often deployed in unattended or even hostile environments and are usually not equipped with tamper-resistant hardware, it is relatively easy to compromise a sensor node. By compromising a sensor node, an adversary gets access to all data stored on the node, such as cryptographic keys. Thus, deployed security mechanisms such as node-based authentication become ineffective and an adversary is able to perform attacks as a "legitimate" member of the network. Such attacks are denoted as insider attacks and pose a serious threat for wireless sensor networks. In this thesis, we develop concepts and mechanisms to cope with insider attacks in wireless sensor networks. The contribution of this thesis is twofold. First, we propose a new general classification to classify the different approaches to protect against insider attacks. Second, we propose several security protocols to protect against insider attacks. In our classification, approaches to protect against insider attacks are first distinguished by the implemented security strategy. The respective strategies are further subclassified by the applied mechanisms. Related work is integrated in the classification to systematically identify open problems and specific properties in the respective areas. The results may be a basis for future protocol design. The protocols, proposed in the second part of this thesis encompass different areas. First, we propose a protocol to protect against a serious Denial-of-Service attack where an adversary injects or replays a large amount of false messages to overload many message forwarding nodes and to (totally) waste their scarce energy resources. Proposed approaches usually apply threshold-based mechanisms to filter such messages out. The drawback of this approach is that messages are not filtered out immediately and if the threshold of compromised nodes is reached, the attack becomes again possible. Our protocol is able to immediately filter such messages while tolerating an arbitrary number of compromised sensor nodes. Further mechanisms are required to additionally protect against an insider attack where an adversary injects false reports to deceive the sink. Usually a redundancy-based approach is used where a report is only valid if it has been collaboratively generated by multiple sensor nodes. However, previously proposed protocols are susceptible to an insider attack where an adversary that has compromised only a single node might be able to impede a successful report generation. So far, only one protocol has been proposed to cope with this issue. However, it is a specific enhancement for a particular protocol and the attacking nodes cannot be identified and excluded. In this thesis, we propose two protocols which protect against the injection of false reports and also enable the detection and exclusion of nodes trying to disrupt the collaborative report generation. In addition, our protocols can be used in combination with or as an extension to any other protocol. In addition, we investigate a general approach to prevent insider attacks and to detect compromised nodes in certain scenarios. We propose to use tamper-resistant hardware in form of the Trusted Platform Module (TPM). Due to cost reasons, the TPM is integrated only in some special sensor nodes that perform some special tasks such as key management, localization or time synchronization in the sensor network. These nodes are a valuable target for an adversary. To detect tampering attempts on these nodes, we propose two efficient attestation protocols. In contrast to attestation protocols proposed for "classical" networks, our protocols have a low communication and computational overhead. They do not require expensive public key operations on the verifying nodes and the few exchanged messages are very short. In addition, compared to software-based attestation, our protocols have the advantage to enable attestation along multiple hops which is of high concern in sensor networks. Using our approach, it is possible to verify the trustworthiness of certain sensor nodes even in unattended or hostile environments making them suitable to perform special tasks.
APA, Harvard, Vancouver, ISO, and other styles
9

Chen, Chien-Hung, and 陳建宏. "Using Subliminal Channel Mechanism to Defend Against the Insider Attacks." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/52904837083392712115.

Full text
Abstract:
碩士<br>朝陽科技大學<br>資訊工程系碩士班<br>101<br>Due to the rapid development of the Internet, many applications of Internet are widely used. It brings convenient, but derives many problems. We often hear news about insider trading in different enterprises, the cheating case of engineer commercial spying, etc. The security of Internet becomes an important issue in the transaction. In this thesis, we proposed two schemes to apply in different environment. In the first scheme, we defend against the illegal insider trading of enterprises to construct an investigator unearths illegal behavior via a subliminal channel. The scheme can let investigator safety to send the evidence to the organization. And we set an official agent to make both have fair arbitration. The second scheme focuses on e-bidding case. We proposed an electronic public engineering project bidding protocol via a subliminal channel. In the bidding phase, we use the blind signature based on ElGamal mechanism to protect bidder’s identity, also can prevent the insiders of Public Construction Commission to disclose bid information. And we use the arbitration mechanism to construct a secure and fair scheme to protect the rights benefit.
APA, Harvard, Vancouver, ISO, and other styles
10

Krauß, Christoph [Verfasser]. "Handling insider attacks in wireless sensor networks / vorgelegt von Christoph Krauß." 2010. http://d-nb.info/1003545335/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Insider attacks"

1

Brancik, Kenneth C. Insider computer fraud: An indepth framework for detecting and defending against insider it attacks. Auerbach Publications, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Stolfo, Salvatore J., Steven M. Bellovin, Angelos D. Keromytis, Shlomo Hershkop, Sean W. Smith, and Sara Sinclair, eds. Insider Attack and Cyber Security. Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-77322-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Schatzki, Nick. Inside 9/11. National Geographic, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Storad, Conrad J. Inside AIDS: HIV attacks the immune system. Lerner Publications Co., 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Group, Express, ed. Inside 26/11. Express Group, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Group, Express, ed. Inside 26/11. Express Group, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Group, Express. Inside 26/11. Express Group, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Workshop on Insider Attack and Cyber Security (1st : 2007 : Washington, D.C.), ed. Insider attack and cyber security: Beyond the hacker. Springer, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Yang, Qing, and Lin Huang. Inside Radio: An Attack and Defense Guide. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8447-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Schreyer, Paul. Inside 9/11: Neue Fakten und Hintergründe zehn Jahre danach. Kai Homilius Verlag, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Insider attacks"

1

Sundararajan, Sudharsan, Hari Narayanan, Vipin Pavithran, Kaladhar Vorungati, and Krishnashree Achuthan. "Preventing Insider Attacks in the Cloud." In Advances in Computing and Communications. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22709-7_48.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dagon, David, Wenke Lee, and Richard Lipton. "Protecting Secret Data from Insider Attacks." In Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11507840_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sattarzadeh, Behnam, and Mehran S. Fallah. "Is Cryptyc Able to Detect Insider Attacks?" In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29420-4_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

van Deursen, Ton, and Saša Radomirović. "Insider Attacks and Privacy of RFID Protocols." In Public Key Infrastructures, Services and Applications. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29804-2_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hao, Yiru, Saru Kumari, Kuruva Lakshmanna, and Chien-Ming Chen. "Privileged Insider Attacks on Two Authentication Schemes." In Advances in Smart Vehicular Technology, Transportation, Communication and Applications. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-0848-6_41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ibrahim, Amjad, Simon Rehwald, Antoine Scemama, Florian Andres, and Alexander Pretschner. "Causal Model Extraction from Attack Trees to Attribute Malicious Insider Attacks." In Graphical Models for Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62230-5_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Pattabiraman, Karthik, Nithin Nakka, Zbigniew Kalbarczyk, and Ravishankar Iyer. "Discovering Application-Level Insider Attacks Using Symbolic Execution." In Emerging Challenges for Security, Privacy and Trust. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01244-0_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Camacho, Pedro, Bruno Cabral, and Jorge Bernardino. "Insider Attacks in a Non-secure Hadoop Environment." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-56538-5_54.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Constantinides, Argyris, Marios Belk, Christos Fidas, and Andreas Pitsillides. "Understanding Insider Attacks in Personalized Picture Password Schemes." In Human-Computer Interaction – INTERACT 2021. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-85610-6_42.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Upadhyaya, Shambhu. "Real-Time Intrusion Detection with Emphasis on Insider Attacks." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-45215-7_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Insider attacks"

1

Zewdie, Marshet, Anteneh Girma, and Tilahun Melak Sitote. "Deep Neural Networks for Detecting Insider Threats and Social Engineering Attacks." In 2024 International Conference on Electrical, Computer and Energy Technologies (ICECET). IEEE, 2024. http://dx.doi.org/10.1109/icecet61485.2024.10698519.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sivanagireddy, K., S. Jagadeesh, K. Suresh Kumar, B. A. Chandrika, M. Kranthi Kumar, and P. Rajalingam. "Detecting and Mitigating Insider Threat Attacks in Cloud using Machine Learning." In 2024 IEEE 6th International Conference on Cybernetics, Cognition and Machine Learning Applications (ICCCMLA). IEEE, 2024. https://doi.org/10.1109/icccmla63077.2024.10871803.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Altarawneh, Amani, and Jemima Owusu-Tweneboah. "Assessing the Resilience of BFT-Raft Consensus Against Insider DoS Attacks in Blockchain." In 2025 IEEE 15th Annual Computing and Communication Workshop and Conference (CCWC). IEEE, 2025. https://doi.org/10.1109/ccwc62904.2025.10903681.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Amri, Jamel, Egil Gulbrandsen, and Ricardo P. Nogueira. "Effect of Acetic Acid on Propagation and Stifling of Localized Attacks in CO2 Corrosion of Carbon Steel." In CORROSION 2009. NACE International, 2009. https://doi.org/10.5006/c2009-09284.

Full text
Abstract:
Abstract The presence of acetic acid (HAc) has been identified as one factor that may contribute to enhance localized top-of-line corrosion attacks in gas condensate pipelines. The role of HAc on the growth of localized attacks in CO2 corrosion of carbon steel pipelines was studied by means of a pre-initiated localized attack electrode assembly (“artificial pit electrode”). The current flowing between the localized attack and the outer surface was measured with a zero resistance ammeter. It is shown that the corrosion potential increases with increasing HAc concentration. Depletion of HAc inside the attack imposed a potential difference that triggered the propagation of the attack at room temperature. The attack did not propagate in absence of HAc. The growth of the attack was self-sustained only to a certain depth, beyond which the dissolution current at the bottom of the attack vanished. This is in good agreement with field observations in the case of top-of-line corrosion phenomena.
APA, Harvard, Vancouver, ISO, and other styles
5

Marek, James. "Cybersecurity and Risk Management Framework in Avionics." In Vertical Flight Society 74th Annual Forum & Technology Display. The Vertical Flight Society, 2018. http://dx.doi.org/10.4050/f-0074-2018-12893.

Full text
Abstract:
It is impossible to open a newspaper, turn on a television, or visit a news website these days without being barraged with cybersecurity related news. Every domain is being attacked, penetrated, and impacted by cyber-crime and the range, complexity, and frequency of attacks is expanding daily. Across the board we face a wide range of adversaries from disgruntled employees to nation states that are bent on taking our critical systems down temporarily or permanently. Avionics systems are not immune from this and over the past several years, cybersecurity policies and the Risk Management Framework (DoD 8510.01) approach to securing US cyber systems, have been maturing and rapidly growing in adoption. However, many in the avionics community remain uninformed regarding the impacts of these new policies and initiatives to their systems nor how best to ensure they are taking a practical and efficient approach to implementing them. Gone are the days of a magic box that all of the security requirements are allocated to. Modern Cybersecurity is a systems discipline and cuts across the entire avionics suite. This paper will introduce the Risk Management Framework (RMF) and Cybersecurity and discuss what they are, how we got here, how they are related, and how they are impacting and will impact legacy and future avionics systems on tactical military aircraft. The paper will present some observations and best practices associated with application of Cybersecurity and RMF to avionics. It will also include some benefits of safety critical designs toward cyber-hardening and where safety and security are mutually exclusive. It will touch briefly on some impacts to avionics systems related to hot Cybersecurity topics such as HBSS (Host Based Security System), STIGs (Security Technical Implementation Guides), Static code analysis, DoD PKI (Department of Defense Public Key Infrastructure), electronic delivery, and insider threats. The paper will include a perspective on the development environment, the deployed systems, and deployment sites and how RMF and Cybersecurity impact both the contractor and the DoD customer related to these perspectives.
APA, Harvard, Vancouver, ISO, and other styles
6

Duncan, Adrian J., Sadie Creese, and Michael Goldsmith. "Insider Attacks in Cloud Computing." In 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2012. http://dx.doi.org/10.1109/trustcom.2012.188.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Usmani, Wali Ahmed, Diogo Marques, Ivan Beschastnikh, Konstantin Beznosov, Tiago Guerreiro, and Luís Carriço. "Characterizing Social Insider Attacks on Facebook." In CHI '17: CHI Conference on Human Factors in Computing Systems. ACM, 2017. http://dx.doi.org/10.1145/3025453.3025901.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kul, Gokhan, Shambhu Upadhyaya, and Andrew Hughes. "Complexity of Insider Attacks to Databases." In CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2017. http://dx.doi.org/10.1145/3139923.3139927.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ajayi, Oluwaseyi, and Tarek Saadawi. "Detecting Insider Attacks in Blockchain Networks." In 2021 International Symposium on Networks, Computers and Communications (ISNCC). IEEE, 2021. http://dx.doi.org/10.1109/isncc52172.2021.9615799.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zhang, Yan-Mei, Zhen-Wei Yu, and Huai-Hu Cao. "Insider Attacks Study Against Mobile IPv6 Protocol." In 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). IEEE, 2008. http://dx.doi.org/10.1109/wicom.2008.1117.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Insider attacks"

1

Kelly, Luke. Threats to Civilian Aviation Since 1975. Institute of Development Studies (IDS), 2021. http://dx.doi.org/10.19088/k4d.2021.019.

Full text
Abstract:
This literature review finds that the main malicious threats to civilian aviation since 1975 are attacks by terrorist groups, deliberate or accidental damage arising from conflicts, and incidents caused by people who work for airlines or airports. While the sector has responded to hijackings and bombings with increasing security since the 1970s, actors seeking to attack aircraft have modified their tactics, and new threats such as liquid explosives and cyber attacks have emerged. Civilian aviation has seen relatively fewer accidents and deaths over the years, but threats remain. The review focuses on malicious threats to civilian aviation. It, therefore, excludes weather events or accidents. The first section lists major malicious threats to civilian aviation since 1975. It includes both actual and planned events (e.g. hijackings that were prevented) that are recorded in open-source documents. Each threat is listed alongside information on its cause (e.g. terrorism, state actions, crime), the context in which it occurred (broader factors shaping the risk including geography, regime type, technology), and its impact (on passengers, policy, security, economic). The second section discusses some of the trends in threats to aviation. Motives for malicious threats include terrorism, crime, asylum-seeking, and insider attacks by aggrieved or mentally ill airline staff. Hijacking has been the most common form of threat, although bombing or suicide attacks have killed more people. Threats may also take the form of accidental attacks on civilian planes misidentified as threats in conflict zones. Experts suggest that growing threats are cyberattacks and the use of unmanned aerial vehicles, although neither has yet caused a major incident.
APA, Harvard, Vancouver, ISO, and other styles
2

Chu, Tsong-Lun, Athi Varuttamaseni, Joo-Seok Baek, and Susan Pepper. An Approach for Assessing Consequences of Potential Supply Chain and Insider Contributed Cyber Attacks on Nuclear Power Plants. Office of Scientific and Technical Information (OSTI), 2016. http://dx.doi.org/10.2172/1329799.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bowen, Brian M., Shlomo Hershkop, Angelos D. Keromytis, and Salvatore J. Stolfo. Baiting Inside Attackers using Decoy Documents. Defense Technical Information Center, 2008. http://dx.doi.org/10.21236/ada500672.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Floyd, Jason, and Daniel Madrzykowski. Analysis of a Near Miss in a Garden Apartment Fire – Georgia 2022. UL's Fire Safety Research Institute, 2022. http://dx.doi.org/10.54206/102376/rsfd6862.

Full text
Abstract:
On February 9, 2022, Cobb County Fire and Emergency Services responded to a fire in a ground floor unit in a garden apartment building. At arrival, the fire was a post-flashover fire in a bedroom. Initial fire control was attempted by an interior fire attack team which was unable to quickly locate the fire. Exterior suppression through the bedroom window was started prior to discovery of the fire by the interior team. Shortly after fire discovery by the internal team, a mayday was called. Four firefighters from the interior fire attack team received first and second degree burns. This report analyzes photographic, video, and written documentation from the incident to evaluate the timeline of the incident and to assess the fire conditions present. Computer modeling using the Fire Dynamics Simulator (FDS) was performed to provide further insight into the fire conditions and the impact of decisions and actions on the fire ground. Additionally, data from a full scale fire test of a similar fire in a similar structure was used to provide additional insight. Four FDS simulations were performed in support of the analysis. These included a simulation of the event as it unfolded and three simulations looking at the impact of alternate tactics which included: initial exterior attack prior to entry, the use of a smoke curtain to protect the building exit path, and interior only attack. FDS simulations provided insight on the heat present in the apartment during the fire and the impact of the interior and exterior suppression on conditions inside the apartment. Full scale test data of a similar fire showed similar behavior to the FDS predictions and gives credence to the FDS results. Results of the analysis suggest that injuries resulted from the length of time the interior attack team was present inside the apartment before actions were taken to reduce the severity of the fire. Six contributing factors were identified including size-up, communication and accountability, delayed exterior attack, lack of entry hall protection, the apartment layout and construction, thermal imager use, and mayday procedures and training. The last contributing factor was a positive contribution that helped avoid more serious injuries. Based on the contributing factors, five recommendations were made that include improved size-up, exterior fire control to prevent exterior spread, protection of exit pathways, basing fire ground tactics on known information, and recognizing when a change in tactics is needed.
APA, Harvard, Vancouver, ISO, and other styles
5

Hillestad, Torgeir Martin. The Metapsychology of Evil: Main Theoretical Perspectives Causes, Consequences and Critique. University of Stavanger, 2014. http://dx.doi.org/10.31265/usps.224.

Full text
Abstract:
The purpose of this text or dissertation is to throw some basic light on a fundamental problem concerning manhood, namely the question of evil, its main sources, dynamics and importance for human attitudes and behaviour. The perspective behind the analysis itself is that of psychology. Somebody, or many, may feel at bit nervous by the word “evil” itself. It may very well be seen as too connected to religion, myth and even superstition. Yet those who are motivated to lose oneself in the subject retain a deep interest in human destructiveness, malevolence and hate, significant themes pointing at threatening prospects for mankind. The text is organized or divided into four main ordinary chapters, the three first of them organized or divided into continuous and numbered sections. A crucial point or question is of cause how to define evil itself. It can of cause be done both intentional, instrumental and by consequence. Other theorists however have stated that the concept of evil exclusively rests on a myth originated in the Judean-Christian conception of Satan and ultimate evil. This last argument presupposes evil itself as non-existent in the real rational world. It seems however a fact that most people attach certain basic meaning to the concept, mainly that it represents ultimately bad and terrible actions and behaviour directed toward common people for the purpose of bringing upon them ultimate pain and suffer. However, there is no room for essentialism here, meaning that we simply can look “inside” some original matter to get to know what it “really” is. Rather, a phenomenon gets its identity from the constituted meaning operating within a certain human communities and contexts loaded with intentionality and inter-subjective meaning. As mentioned above, the concept of evil can be interpreted both instrumental and intentional, the first being the broadest of them. Here evil stands for behaviour and human deeds having terrifying or fatal consequences for subjects and people or in general, regardless of the intentions behind. The intentional interpretation however, links the concept to certain predispositions, characteristics and even strong motives in subjects, groups and sometimes political systems and nations. I will keep in mind and clear the way for both these perspectives for the discussion in prospect. This essay represents a psychological perspective on evil, but makes it clear that a more or less complete account of such a psychological view also should include a thorough understanding or integration of some basic social and even biological assumptions. However, I consider a social psychological position of significant importance, especially because in my opinion it represents some sort of coordination of knowledge and theoretical perspectives inherent in the subject or problem itself, the main task here being to integrate perspectives of a psychological as well as social and biological kind. Since humans are essential social creatures, the way itself to present knowledge concerning the human condition, must be social of some sort and kind, however not referring to some kind of reductionism where social models of explanation possess or holds monopoly. Social and social psychological perspectives itself represents parts of the whole matter regarding understanding and explanation of human evil. The fact that humans present, or has to represent themselves as humans among other humans, means that basically a social language is required both to explain and describe human manners and ways of being. This then truly represents its own way or, more correctly, level or standard of explanation, which makes social psychology some sort of significant, though not sufficient. More substantial, the vision itself of integrating different ontological and theoretical levels and objects of science for the purpose of manifesting or make real a full-fledged psychological perspective on evil, should be considered or characterized a meta-psychological perspective. The text is partially constructed as a review of existing theories and theorists concerning the matter of evil and logically associated themes such as violence, mass murder, genocide, antisocial behaviour in general, aggression, hate and cruelty. However, the demands of making a theoretical distinction between these themes, although connected, is stressed. Above all, an integral perspective combining different scientific disciplines is aimed at.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography