| Literature DB >> 35494800 |
Rakan A Alsowail1, Taher Al-Shehari1.
Abstract
With the wide use of technologies nowadays, various security issues have emerged. Public and private sectors are both spending a large portion of their budget to protect the confidentiality, integrity, and availability of their data from possible attacks. Among these attacks are insider attacks which are more serious than external attacks, as insiders are authorized users who have legitimate access to sensitive assets of an organization. As a result, several studies exist in the literature aimed to develop techniques and tools to detect and prevent various types of insider threats. This article reviews different techniques and countermeasures that are proposed to prevent insider attacks. A unified classification model is proposed to classify the insider threat prevention approaches into two categories (biometric-based and asset-based metric). The biometric-based category is also classified into (physiological, behavioral and physical), while the asset metric-based category is also classified into (host, network and combined). This classification systematizes the reviewed approaches that are validated with empirical results utilizing the grounded theory method for rigorous literature review. Additionally, the article compares and discusses significant theoretical and empirical factors that play a key role in the effectiveness of insider threat prevention approaches (e.g., datasets, feature domains, classification algorithms, evaluation metrics, real-world simulation, stability and scalability, etc.). Major challenges are also highlighted which need to be considered when deploying real-world insider threat prevention systems. Some research gaps and recommendations are also presented for future research directions. ©2022 Alsowail and Al-Shehari.Entities:
Keywords: Insider threat prevention; Rigorous literature review; Theoretical and empirical aspects; Security and privacy
Year: 2022 PMID: 35494800 PMCID: PMC9044369 DOI: 10.7717/peerj-cs.938
Source DB: PubMed Journal: PeerJ Comput Sci ISSN: 2376-5992
Five stages of grounded theory.
| Stage | Task |
|---|---|
| 1. Define | 1.1 Define criteria for inclusion or exclusion |
| 1.2 Identify the field of the research | |
| 1.3 Determine appropriate academic sources | |
| 1.4 Decide specific searched keywords | |
| 2. Search | 2.1 Search |
| 3. Select | 3.1 Refine the downloaded articles |
| 4. Analyze | 4.1 Open coding |
| 4.2 Axial coding | |
| 4.3 Selective coding | |
| 5. Present | 5.1 Represent and arrange the content |
| 5.2 Structure the article |
Figure 1The strategy utilized for selecting the articles based on the Ground Theory.
Figure 2The proposed classification model of the insider threat prevention approaches.
Biometric-based approaches.
| Approach | Addressed threat | Feature domain | Dataset | Classification technique | Accuracy | Ref. |
|---|---|---|---|---|---|---|
| Behavioral | Masquerader | Typing patterns | CERT | SVM | Misc. |
|
| Behavioral | Malicious Insider | Head micro- movements | Synthetic | NA | 92.2% |
|
| Behavioral | Masquerader | Eyes motions | Synthetic | kNN & SVM | 84.56% |
|
| Behavioral | Malicious Insider | perceptions and behavioral intentions | Survey instruments | PLS-SEM | Misc. |
|
| Physiological | Malicious Insider | Brain signals | Synthetic | SVM | 100% |
|
A summary of the asset-metrics based approaches for preventing insider malicious acts.
| Ref. | Addressed threat | Approach | Feature domain | Dataset | Classification technique | Evaluation metrics |
|---|---|---|---|---|---|---|
|
| USB malicious codes | Host-based | USB device | Synthetic | Rule matching | Transfer time, latency |
|
| DB modifications | Host-based | DB Transactions | Synthetic | Rule matching | False Negatives |
|
| DB modifications | Host-based | DB transactions, and dependencies | Synthetic | Log-based & Dependency-based | Frequency and time |
|
| Data leakage | Host-based | SQL queries | Synthetic & Real | Rule matching & Anomalous | False positives |
|
| Intellectual Property Theft | Host-based | USB device | Synthetic | Rule matching | No. of blocked cases |
|
| Data leakage | Host-based | USB ports | Synthetic | Rule matching | No. of blocked cases |
|
| Intellectual Property Theft | Combined | Files operations | Synthetic | Rule matching & Anomalous | Precision, Recall, and F-measure |
|
| Data leakage | Network-based | Packets traffic | Synthetic | Rule matching | Throughput, transfer time, CPU usage |
|
| Suspicious v insiders | Combined | Geo-Social | Synthetic | Anomalous modeling | TP, FN, FP, TN |
Figure 3Theoretical and empirical aspects of reveied apparoches.
Figure 4The insider threats that violate the CIA of orgnization assets.
Addressed threats and protected Confidentiality (C), Integrity (I) and Availability (A) factors by reviewed approaches.
| Ref. | Addressed threat | Insider | C | I | A |
|---|---|---|---|---|---|
|
| DB modifications | Malicious | ✓ | ||
|
| Accessing and damaging assets | Malicious | ✓ | ✓ | |
|
| Data modifications | Masquerader | ✓ | ||
|
| Data modifications | Masquerader | ✓ | ||
|
| DB modifications | Malicious | ✓ | ||
|
| USB malicious code injections | Misc. | ✓ | ✓ | ✓ |
|
| Data leakages | Malicious | ✓ | ||
|
| Data leakages | Malicious | ✓ | ||
|
| Accessing and damaging assets | Malicious | ✓ | ✓ | |
|
| Misc. | Malicious | ✓ | ✓ | ✓ |
The classification of reviewed approaches as “detection & prevention” or “prevention”.
| Ref. | Approach | Description |
|---|---|---|
|
| Prevention | The technique prevents malicious modifications on a database by matching malicious database transactions of an insider based on predefined rules. |
|
| Prevention | The technique observes the insider’s intention of access utilizing brain signal biometrics. If there is a malicious intent, the access to an asset was prevented before an attack occurred. |
|
| Detection & Prevention | The technique detects a masquerader by detecting his/her anomalous typing patterns and then an attack is prevented. |
|
| Detection & Prevention | The technique detects a masquerader by detecting his/her suspicious eye motions. After that, an attack was prevented. |
|
| Prevention | The technique prevents malicious updates on a database by matching database transactions with predefined logs and dependencies. |
|
| Prevention | The technique prevents USB malicious codes according to predefined signatures of USB operations. |
|
| Detection & Prevention | The technique detects a data leakage attack on a database by detecting anomalous SQL queries, and then such an attack is prevented. |
|
| Prevention | The technique prevents a data leakage attack on the network level by matching packet traffic characteristics with predefined signatures. |
|
| Prevention | The technique observes the insider’s intention of access utilizing suspicious head motions. If there is a malicious intent by an insider, the access to an asset was prevented. |
|
| Detection & Prevention | The technique detects the anomalous behavior of insiders based on their geo-social context. If a suspicious insider reaches a threshold of a risk level, then an attack is prevented. |
Physiological vs behavioral biometric-based approaches.
| Ref. | Approach | Observables | Pros | Cons |
|---|---|---|---|---|
|
| Physiological | Brain signals | − High accuracy (100%) | - Not satisfied by insiders as it requires track devices to be mounted on their heads. |
|
| Behavioral | Typing patterns | − Reveals the real behavior, as the profiling process is unnoticed by insiders. | It addresses data modification threats, while other threats, for instance, data removal cannot be detected. |
|
| Behavioral | Eye motions | − Continuous authentication throughout the session. | − Addresses the masquerader attack only. |
|
| Behavioral | Head micro-movements | − Continuous authentication throughout the session. | Not accepted by insiders, as it requires measurement devices to be mounted on their heads. |
Number of insiders and resources handled by the insider threat prevention approaches.
| Ref. | Focus | Count |
|---|---|---|
|
| Resources | 4 |
|
| Insiders | 250 |
|
| Insiders | 40 |
|
| Insiders | 11 |
|
| Insiders | 30 |
|
| Insiders | 30 |
|
| SQL transactions | 150 |
|
| Write operations | 111 |
|
| Insiders | 100 |
|
| Insiders | 30 |
Figure 5Empirical factors of the insider threat prevention approaches.
The utilized datasets for validateing the reveiwed approaches.
| Ref. | Dataset | Availability |
|---|---|---|
|
| Synthetic | Private |
|
| Synthetic | Private |
|
| Synthetic (CERT) | Public at [53] |
|
| Synthetic | Private |
|
| Synthetic | Private |
|
| Synthetic | Private |
|
| Synthetic & Real-world | Public at [54] |
|
| Synthetic | Private |
|
| Synthetic | Private |
|
| Synthetic & Real-world | Public at [45] |
Approaches, domain and data features of the reviewed apparoches.
| Ref. | Approach | Domain | Features |
|---|---|---|---|
|
| Asset-based (Host) | Databases | DB Transactions |
|
| Biometric-based (Physiological) | Insiders | Brain signals |
|
| Biometric-based (Behavioral) | Insiders | Typing patterns |
|
| Biometric-based (Behavioral) | Insiders | Eyes motions |
|
| Asset-based (Host) | Databases | DB transactions, and dependencies |
|
| Asset-based (Host) | Computers | USB devices |
|
| Asset-based (Host) | Databases | SQL queries |
|
| Asset-based (Network-based) | Network packets | Requests and Responses |
|
| Biometric-based (Behavioral) | Insiders | Head motions |
|
| Combined (Host and Network) | Geo-Social | Locations, devices and connections |
The classification methods employed by insider threat prevention approaches.
| Ref. | Classification method |
|---|---|
|
| Signature matching |
|
| SVM |
|
| SVM |
|
| SVM |
|
| Signature matching & Anomalous modeling |
|
| Signature matching |
|
| Signature matching & Anomalous modeling |
|
| Signature matching |
|
| Statistical modeling |
|
| Anomalous modeling |
The evaluation metrics of the reviewed approaches.
| Metrics | Description | Ref. |
|---|---|---|
| FN | False Negative (FN) is the number of malicious acts that are not prevented by an approach. |
|
| RAM | Risk Assessment Matrix (RAM) calculates the risk level for an asset with respect to malicious acts of an insider. |
|
| EER | Equal Error Rate (EER) is the rate of an intersection between False Acceptance Rate (FAR) and False Rejection Rate (FRR). | |
| Frequency and time | Determine the performance of the approach by calculating the frequency of validations and the time taken to address the threats. |
|
| Transferring time | The average time of transferring data from PC to USB device while preventing USB malicious code injections. |
|
| FP | False Positive (FP) is the number of legitimate activities of an insider that are counted as malicious ones. |
|
| Performance | Determine the performance of the approach in terms of throughput, average response time, and CPU utilization. |
|
| Accuracy and acceptance rate | The accuracy rate of preventing malicious acts from insiders, and the acceptance rate of insiders for the measurements devices mounted on their heads. |
|
| TP, FN, FP and TN | True Positive (TP) is the percentage of malicious acts prevented correctly. |
|
Confusion matrix (accuracy metrics) of the insider threat prevention approaches.
| Action∖Reaction | Prevented | Not Prevented |
|---|---|---|
| Malicious act | True Positive (TP) | False Negative (FN) |
| Legitimate act | False Positive (FP) | True Negative (TN) |