Cargando…

Techniques and countermeasures for preventing insider threats

With the wide use of technologies nowadays, various security issues have emerged. Public and private sectors are both spending a large portion of their budget to protect the confidentiality, integrity, and availability of their data from possible attacks. Among these attacks are insider attacks whic...

Descripción completa

Detalles Bibliográficos
Autores principales: Alsowail, Rakan A., Al-Shehari, Taher
Formato: Online Artículo Texto
Lenguaje:English
Publicado: PeerJ Inc. 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9044369/
https://www.ncbi.nlm.nih.gov/pubmed/35494800
http://dx.doi.org/10.7717/peerj-cs.938
_version_ 1784695090552242176
author Alsowail, Rakan A.
Al-Shehari, Taher
author_facet Alsowail, Rakan A.
Al-Shehari, Taher
author_sort Alsowail, Rakan A.
collection PubMed
description With the wide use of technologies nowadays, various security issues have emerged. Public and private sectors are both spending a large portion of their budget to protect the confidentiality, integrity, and availability of their data from possible attacks. Among these attacks are insider attacks which are more serious than external attacks, as insiders are authorized users who have legitimate access to sensitive assets of an organization. As a result, several studies exist in the literature aimed to develop techniques and tools to detect and prevent various types of insider threats. This article reviews different techniques and countermeasures that are proposed to prevent insider attacks. A unified classification model is proposed to classify the insider threat prevention approaches into two categories (biometric-based and asset-based metric). The biometric-based category is also classified into (physiological, behavioral and physical), while the asset metric-based category is also classified into (host, network and combined). This classification systematizes the reviewed approaches that are validated with empirical results utilizing the grounded theory method for rigorous literature review. Additionally, the article compares and discusses significant theoretical and empirical factors that play a key role in the effectiveness of insider threat prevention approaches (e.g., datasets, feature domains, classification algorithms, evaluation metrics, real-world simulation, stability and scalability, etc.). Major challenges are also highlighted which need to be considered when deploying real-world insider threat prevention systems. Some research gaps and recommendations are also presented for future research directions.
format Online
Article
Text
id pubmed-9044369
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher PeerJ Inc.
record_format MEDLINE/PubMed
spelling pubmed-90443692022-04-28 Techniques and countermeasures for preventing insider threats Alsowail, Rakan A. Al-Shehari, Taher PeerJ Comput Sci Human-Computer Interaction With the wide use of technologies nowadays, various security issues have emerged. Public and private sectors are both spending a large portion of their budget to protect the confidentiality, integrity, and availability of their data from possible attacks. Among these attacks are insider attacks which are more serious than external attacks, as insiders are authorized users who have legitimate access to sensitive assets of an organization. As a result, several studies exist in the literature aimed to develop techniques and tools to detect and prevent various types of insider threats. This article reviews different techniques and countermeasures that are proposed to prevent insider attacks. A unified classification model is proposed to classify the insider threat prevention approaches into two categories (biometric-based and asset-based metric). The biometric-based category is also classified into (physiological, behavioral and physical), while the asset metric-based category is also classified into (host, network and combined). This classification systematizes the reviewed approaches that are validated with empirical results utilizing the grounded theory method for rigorous literature review. Additionally, the article compares and discusses significant theoretical and empirical factors that play a key role in the effectiveness of insider threat prevention approaches (e.g., datasets, feature domains, classification algorithms, evaluation metrics, real-world simulation, stability and scalability, etc.). Major challenges are also highlighted which need to be considered when deploying real-world insider threat prevention systems. Some research gaps and recommendations are also presented for future research directions. PeerJ Inc. 2022-04-01 /pmc/articles/PMC9044369/ /pubmed/35494800 http://dx.doi.org/10.7717/peerj-cs.938 Text en ©2022 Alsowail and Al-Shehari https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited.
spellingShingle Human-Computer Interaction
Alsowail, Rakan A.
Al-Shehari, Taher
Techniques and countermeasures for preventing insider threats
title Techniques and countermeasures for preventing insider threats
title_full Techniques and countermeasures for preventing insider threats
title_fullStr Techniques and countermeasures for preventing insider threats
title_full_unstemmed Techniques and countermeasures for preventing insider threats
title_short Techniques and countermeasures for preventing insider threats
title_sort techniques and countermeasures for preventing insider threats
topic Human-Computer Interaction
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9044369/
https://www.ncbi.nlm.nih.gov/pubmed/35494800
http://dx.doi.org/10.7717/peerj-cs.938
work_keys_str_mv AT alsowailrakana techniquesandcountermeasuresforpreventinginsiderthreats
AT alsheharitaher techniquesandcountermeasuresforpreventinginsiderthreats