Detecting Masquerading Traitors from Process Visualization of Computer

Varování

Publikace nespadá pod Pedagogickou fakultu, ale pod Fakultu informatiky. Oficiální stránka publikace je na webu muni.cz.
Autoři

MACÁK Martin OŠLEJŠEK Radek BÜHNOVÁ Barbora

Rok publikování 2023
Druh Článek ve sborníku
Konference 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
Fakulta / Pracoviště MU

Fakulta informatiky

Citace
www https://ieeexplore.ieee.org/document/10538928
Doi http://dx.doi.org/10.1109/TrustCom60117.2023.00263
Klíčová slova insider attack;process visualization;cybersecurity;traitor;organization
Popis Insider attacks in organizations are currently one of the most crucial cybersecurity challenges. Traitors are one of the most dangerous types of insider attackers. They are difficult to detect because they know the organization, processes, defense mechanisms, and employees. Besides abusing their rights and accesses, they can use their co-workers’ rights and accesses. They can hide their activities to perform attacks inconspicuously. The current masquerader detection techniques usually rely on the fact that the masquerader is an outsider, making them unable to detect attacks from the traitor. To detect these insider attackers, which we call masquerading traitors, we propose the human-as-solution approach and engage the employees in deciding whether the usage of their rights and accesses is suspicious and, therefore, might be performed by a masquerading traitor.
Související projekty:

Používáte starou verzi internetového prohlížeče. Doporučujeme aktualizovat Váš prohlížeč na nejnovější verzi.