Cargando…
Techniques and countermeasures for preventing insider threats
With the wide use of technologies nowadays, various security issues have emerged. Public and private sectors are both spending a large portion of their budget to protect the confidentiality, integrity, and availability of their data from possible attacks. Among these attacks are insider attacks whic...
Autores principales: | , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
PeerJ Inc.
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9044369/ https://www.ncbi.nlm.nih.gov/pubmed/35494800 http://dx.doi.org/10.7717/peerj-cs.938 |
_version_ | 1784695090552242176 |
---|---|
author | Alsowail, Rakan A. Al-Shehari, Taher |
author_facet | Alsowail, Rakan A. Al-Shehari, Taher |
author_sort | Alsowail, Rakan A. |
collection | PubMed |
description | With the wide use of technologies nowadays, various security issues have emerged. Public and private sectors are both spending a large portion of their budget to protect the confidentiality, integrity, and availability of their data from possible attacks. Among these attacks are insider attacks which are more serious than external attacks, as insiders are authorized users who have legitimate access to sensitive assets of an organization. As a result, several studies exist in the literature aimed to develop techniques and tools to detect and prevent various types of insider threats. This article reviews different techniques and countermeasures that are proposed to prevent insider attacks. A unified classification model is proposed to classify the insider threat prevention approaches into two categories (biometric-based and asset-based metric). The biometric-based category is also classified into (physiological, behavioral and physical), while the asset metric-based category is also classified into (host, network and combined). This classification systematizes the reviewed approaches that are validated with empirical results utilizing the grounded theory method for rigorous literature review. Additionally, the article compares and discusses significant theoretical and empirical factors that play a key role in the effectiveness of insider threat prevention approaches (e.g., datasets, feature domains, classification algorithms, evaluation metrics, real-world simulation, stability and scalability, etc.). Major challenges are also highlighted which need to be considered when deploying real-world insider threat prevention systems. Some research gaps and recommendations are also presented for future research directions. |
format | Online Article Text |
id | pubmed-9044369 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | PeerJ Inc. |
record_format | MEDLINE/PubMed |
spelling | pubmed-90443692022-04-28 Techniques and countermeasures for preventing insider threats Alsowail, Rakan A. Al-Shehari, Taher PeerJ Comput Sci Human-Computer Interaction With the wide use of technologies nowadays, various security issues have emerged. Public and private sectors are both spending a large portion of their budget to protect the confidentiality, integrity, and availability of their data from possible attacks. Among these attacks are insider attacks which are more serious than external attacks, as insiders are authorized users who have legitimate access to sensitive assets of an organization. As a result, several studies exist in the literature aimed to develop techniques and tools to detect and prevent various types of insider threats. This article reviews different techniques and countermeasures that are proposed to prevent insider attacks. A unified classification model is proposed to classify the insider threat prevention approaches into two categories (biometric-based and asset-based metric). The biometric-based category is also classified into (physiological, behavioral and physical), while the asset metric-based category is also classified into (host, network and combined). This classification systematizes the reviewed approaches that are validated with empirical results utilizing the grounded theory method for rigorous literature review. Additionally, the article compares and discusses significant theoretical and empirical factors that play a key role in the effectiveness of insider threat prevention approaches (e.g., datasets, feature domains, classification algorithms, evaluation metrics, real-world simulation, stability and scalability, etc.). Major challenges are also highlighted which need to be considered when deploying real-world insider threat prevention systems. Some research gaps and recommendations are also presented for future research directions. PeerJ Inc. 2022-04-01 /pmc/articles/PMC9044369/ /pubmed/35494800 http://dx.doi.org/10.7717/peerj-cs.938 Text en ©2022 Alsowail and Al-Shehari https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited. |
spellingShingle | Human-Computer Interaction Alsowail, Rakan A. Al-Shehari, Taher Techniques and countermeasures for preventing insider threats |
title | Techniques and countermeasures for preventing insider threats |
title_full | Techniques and countermeasures for preventing insider threats |
title_fullStr | Techniques and countermeasures for preventing insider threats |
title_full_unstemmed | Techniques and countermeasures for preventing insider threats |
title_short | Techniques and countermeasures for preventing insider threats |
title_sort | techniques and countermeasures for preventing insider threats |
topic | Human-Computer Interaction |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9044369/ https://www.ncbi.nlm.nih.gov/pubmed/35494800 http://dx.doi.org/10.7717/peerj-cs.938 |
work_keys_str_mv | AT alsowailrakana techniquesandcountermeasuresforpreventinginsiderthreats AT alsheharitaher techniquesandcountermeasuresforpreventinginsiderthreats |