- Title
- Trust enhanced security architecture for detecting insider threats
- Creator
- Tupakula, Udaya; Varadharajan, Vijay
- Relation
- 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. Proceedings of the 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (Melbourne 16-18 July, 2013) p. 552-559
- Publisher Link
- http://dx.doi.org/10.1109/TrustCom.2013.8
- Publisher
- Institute of Electrical and Electronics Engineers (IEEE)
- Resource Type
- conference paper
- Date
- 2013
- Description
- Attacks on the organization networks can be classified as external and internal attacks. For the purpose of this paper we consider that external attacks are generated by the attackers or from hosts outside the organization, and internal attacks are generated by malicious insiders within the organization. Insider attacks have always been challenging to deal with as insiders have legitimate and physical access to the systems within the organization, and they have knowledge of the organization networks and more importantly, are aware of the security environment enforced within the organization. In this paper we propose novel trust enhanced security techniques to deal with the insider attack problem. Our architecture detects the attacks by monitoring the user activity as well as the state of the system using trusted computing in exposing and analyzing suspicious behaviour. We will demonstrate how an insider can exploit the weakness in the systems to generate different attacks and how our architecture can help to prevent such attacks.
- Subject
- insider threat; security architecture; trusted computing; security attacks
- Identifier
- http://hdl.handle.net/1959.13/1356866
- Identifier
- uon:31811
- Identifier
- ISBN:9780769550220
- Language
- eng
- Reviewed
- Hits: 777
- Visitors: 742
- Downloads: 0
Thumbnail | File | Description | Size | Format |
---|