메뉴 건너뛰기




Volumn 2, Issue 1, 2011, Pages 4-27

Insiders and insider threats an overview of definitions and mitigation techniques

Author keywords

[No Author keywords available]

Indexed keywords


EID: 80052621067     PISSN: 20935374     EISSN: 20935382     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (182)

References (71)
  • 6
    • 24644501524 scopus 로고    scopus 로고
    • US Department of Defense, Office of the Assistant Secretary of Defense (Command, Control, Commuications, and Intelligence). Available from, (last viewed March 2011)
    • "DoD Insider Threat Mitigation. Final Report of the Insider Threat Integrated Process Team." US Department of Defense, Office of the Assistant Secretary of Defense (Command, Control, Commuications, and Intelligence). Available from https://acc.dau.mil/CommunityBrowser.aspx?id=37478 (last viewed March 2011), 2000.
    • (2000) DoD Insider Threat Mitigation. Final Report of the Insider Threat Integrated Process Team
  • 7
    • 36949007362 scopus 로고    scopus 로고
    • Challenging the anomaly detection paradigm: A provocative discussion
    • Schloss Dagstuhl, Germany. ACM Press, September, [Online]. Available
    • C. Gates and C. Taylor, "Challenging the anomaly detection paradigm: a provocative discussion," in Proc. of New Security Paradigms Workshop 2006 (NSPW'06), Schloss Dagstuhl, Germany. ACM Press, September 2007, pp. 21-29. [Online]. Available: http://doi.acm.org.globalproxy.cvt.dk/10.1145/1278940.1278945
    • (2007) Proc. of New Security Paradigms Workshop 2006 (NSPW'06) , pp. 21-29
    • Gates, C.1    Taylor, C.2
  • 12
    • 33745593513 scopus 로고    scopus 로고
    • The insider problem revisited
    • Lake Arrowhead, California, USA. ACM Press, September
    • M. Bishop, "The insider problem revisited," in Proc. of New Security Paradigms Workshop 2005 (NSPW'05), Lake Arrowhead, California, USA. ACM Press, September 2005, pp. 75-76.
    • (2005) Proc. of New Security Paradigms Workshop 2005 (NSPW'05 , pp. 75-76
    • Bishop, M.1
  • 14
    • 38149091093 scopus 로고    scopus 로고
    • Master's thesis, Air Force Institute of Technology, available from, (last viewed March 2011)
    • V. Caruso, "Outsourcing information technology and the insider threat," Master's thesis, Air Force Institute of Technology, 2003, available from http://handle.dtic.mil/100.2/ADA415113 (last viewed March 2011).
    • (2003) Outsourcing Information Technology and The Insider Threat
    • Caruso, V.1
  • 15
    • 33646886716 scopus 로고    scopus 로고
    • Available from, (last viewed March 2011)
    • N. Einwechter, "Preventing and detecting insider attacks using ids," Available from http://www.symantec.com/connect/articles/preventing-and-detecting-insider-attacks-using-ids (last viewed March 2011), 2002.
    • (2002) Preventing and Detecting Insider Attacks Using Ids
    • Einwechter, N.1
  • 18
    • 49249119924 scopus 로고    scopus 로고
    • Insiders behaving badly
    • July, [Online]. Available
    • J. Predd, S. L. Pfleeger, J. Hunker, and C. Bulford, "Insiders behaving badly," IEEE Security and Privacy, vol. 6, pp. 66-70, July 2008. [Online]. Available: http://portal.acm.org/citation.cfm?id=1441365.1441416
    • (2008) IEEE Security and Privacy , vol.6 , pp. 66-70
    • Predd, J.1    Pfleeger, S.L.2    Hunker, J.3    Bulford, C.4
  • 19
    • 0036173202 scopus 로고    scopus 로고
    • Insider threat prediction tool: Evaluating the probability of it misuse
    • [Online]. Available
    • G. B. Magklaras and S. M. Furnell, "Insider threat prediction tool: Evaluating the probability of it misuse," Computers & Security, vol. 21, no. 1, pp. 62-73, 2001. [Online]. Available: http://www.sciencedirect.com/science/article/B6V8G-452D9TY-C/2/d3ce0be409d1fbb34d981e7f0cfecc13
    • (2001) Computers & Security , vol.21 , Issue.1 , pp. 62-73
    • Magklaras, G.B.1    Furnell, S.M.2
  • 20
    • 84886892708 scopus 로고    scopus 로고
    • The risk of risk analysis and its relation to the economics of insider threats
    • T. Moore, D. Pym, and C. Ioannidis, Eds. Springer
    • C. W. Probst and J. Hunker, "The risk of risk analysis and its relation to the economics of insider threats," in Economics of Information Security and Privacy, T. Moore, D. Pym, and C. Ioannidis, Eds. Springer, 2010, pp. 279-299.
    • (2010) Economics of Information Security and Privacy , pp. 279-299
    • Probst, C.W.1    Hunker, J.2
  • 35
    • 0012282403 scopus 로고    scopus 로고
    • Computer Intrusion: Detecting Masquerades
    • [Online]. Available
    • M. Schonlau, W. DuMouchel, W. H. Ju, A. F. Karr, M. Theus, and Y. Vardi, "Computer Intrusion: Detecting Masquerades," Statistical Science, vol. 16, no. 1, pp. 58-74, 2001. [Online]. Available: http://dx.doi.org/10.2307/2676780
    • (2001) Statistical Science , vol.16 , Issue.1 , pp. 58-74
    • Schonlau, M.1    Dumouchel, W.2    Ju, W.H.3    Karr, A.F.4    Theus, M.5    Vardi, Y.6
  • 37
    • 0016081584 scopus 로고
    • Protection and the control of information sharing in multics
    • July, [Online]. Available
    • J. H. Saltzer, "Protection and the control of information sharing in multics," Commun. ACM, vol. 17, pp. 388-402, July 1974. [Online]. Available: http://doi.acm.org/10.1145/361011.361067
    • (1974) Commun. ACM , vol.17 , pp. 388-402
    • Saltzer, J.H.1
  • 42
    • 57649097309 scopus 로고    scopus 로고
    • An extensible analysable system model
    • C. W. Probst, "An extensible analysable system model," Information Security Technical Report, vol. 13, pp. 235-246, 2008.
    • (2008) Information Security Technical Report , vol.13 , pp. 235-246
    • Probst, C.W.1
  • 46
    • 33745291009 scopus 로고    scopus 로고
    • Getting even or moving on? power, procedural justice and types of offense as predictors of revenge, forgiveness, reconciliation and avoidance in organizations
    • K. Aquino, T. M. Tripp, and R. J. Bies, "Getting even or moving on? power, procedural justice and types of offense as predictors of revenge, forgiveness, reconciliation and avoidance in organizations," Journal of Applied Psychology, vol. 91, no. 3, pp. 653-668, 2006.
    • (2006) Journal of Applied Psychology , vol.91 , Issue.3 , pp. 653-668
    • Aquino, K.1    Tripp, T.M.2    Bies, R.J.3
  • 47
    • 85047685143 scopus 로고    scopus 로고
    • How employees respond to personal offense: The effects of blame attribution, victim status, and offender status on revenge and reconciliation in the workplace
    • K. Aquino, T. M. Tripp, and R. J. Bies, "How employees respond to personal offense: The effects of blame attribution, victim status, and offender status on revenge and reconciliation in the workplace," Journal of Applied Psychology, vol. 86, no. 1, pp. 52-59, 2001.
    • (2001) Journal of Applied Psychology , vol.86 , Issue.1 , pp. 52-59
    • Aquino, K.1    Tripp, T.M.2    Bies, R.J.3
  • 48
    • 33749645791 scopus 로고    scopus 로고
    • Unfair treatment and revenge taking: The roles of collective identification and feelings of disappointment
    • D. De Cremer, "Unfair treatment and revenge taking: The roles of collective identification and feelings of disappointment," Group Dynamics: Theory, Research and Practice, vol. 10, no. 3, pp. 220-232, 2006.
    • (2006) Group Dynamics: Theory, Research and Practice , vol.10 , Issue.3 , pp. 220-232
    • de Cremer, D.1
  • 49
    • 0036395373 scopus 로고    scopus 로고
    • A framework for understanding and predicting insider attacks
    • [Online]. Available
    • E. E. Schultz, "A framework for understanding and predicting insider attacks," Computers & Security, vol. 21, no. 6, pp. 526-531, 2002. [Online]. Available: http://www.sciencedirect.com/science/article/B6V8G-46XGM6D-9/2/69a602ad8a9c42af84570b33777c4c0c
    • (2002) Computers & Security , vol.21 , Issue.6 , pp. 526-531
    • Schultz, E.E.1
  • 53
    • 0036173202 scopus 로고    scopus 로고
    • Insider threat prediction tool: Evaluating the probability of it misuse
    • [Online]. Available
    • G. B. Magklaras and S. M. Furnell, "Insider threat prediction tool: Evaluating the probability of it misuse," Computers & Security, vol. 21, no. 1, pp. 62-73, 2001. [Online]. Available: http://www.sciencedirect.com/science/article/B6V8G-452D9TY-C/2/d3ce0be409d1fbb34d981e7f0cfecc13
    • (2001) Computers & Security , vol.21 , Issue.1 , pp. 62-73
    • Magklaras, G.B.1    Furnell, S.M.2
  • 54
    • 33646134102 scopus 로고    scopus 로고
    • Developing an insider threat model using functional decomposition
    • ser. Lecture Notes in Computer Science, V. Gorodetsky, I. Kotenko, and V. Skormin, Eds. Springer Berlin/Heidelberg, [Online]. Available
    • J. W. Butts, R. F. Mills, and R. O. Baldwin, "Developing an insider threat model using functional decomposition," in Computer Network Security, ser. Lecture Notes in Computer Science, V. Gorodetsky, I. Kotenko, and V. Skormin, Eds. Springer Berlin/Heidelberg, 2005, vol. 3685, pp. 412-417. [Online]. Available: http://dx.doi.org/10.1007/1156032632
    • (2005) Computer Network Security , vol.3685 , pp. 412-417
    • Butts, J.W.1    Mills, R.F.2    Baldwin, R.O.3
  • 58
    • 24944445620 scopus 로고    scopus 로고
    • An ontological approach to the document access problem of insider threat
    • ser. Lecture Notes in Computer Science, P. Kantor, G. Muresan, F. Roberts, D. D. Zeng, F.-Y. Wang, H. Chen, and R. C. Merkle, Eds. Springer Berlin/Heidelberg, [Online]. Available
    • B. Aleman-Meza, P. Burns, M. Eavenson, D. Palaniswami, and A. Sheth, "An ontological approach to the document access problem of insider threat," in Intelligence and Security Informatics, ser. Lecture Notes in Computer Science, P. Kantor, G. Muresan, F. Roberts, D. D. Zeng, F.-Y. Wang, H. Chen, and R. C. Merkle, Eds. Springer Berlin/Heidelberg, 2005, vol. 3495, pp. 45-47. [Online]. Available: http://dx.doi.org/10.1007/1142799547
    • (2005) Intelligence and Security Informatics , vol.3495 , pp. 45-47
    • Aleman-Meza, B.1    Burns, P.2    Eavenson, M.3    Palaniswami, D.4    Sheth, A.5
  • 62
    • 84886900224 scopus 로고    scopus 로고
    • Director of Central Intelligence/Intelligence, Central Intelligence Agency, 1990, project Slammer is a CIA-sponsored study of Americans convicted of espionage against the United States. A declassified interim report is available at, and http://antipolygraph.org/documents/slammer-12-04-1990.pdf
    • Director of Central Intelligence/Intelligence, "Community staff memorandum ics 0858-90: Project slammer interim report (u)," Central Intelligence Agency, 1990, project Slammer is a CIA-sponsored study of Americans convicted of espionage against the United States. A declassified interim report is available at: http://antipolygraph.org/documents/slammer-12-04-1990.shtml and http://antipolygraph.org/documents/slammer-12-04-1990.pdf.
    • Community Staff Memorandum Ics 0858-90: Project Slammer Interim Report (u)
  • 65
    • 0347887514 scopus 로고    scopus 로고
    • Inside the mind of the insider
    • E. D. Shaw, J. M. Post, and K. G. Ruby, "Inside the mind of the insider," Security Management, vol. 43, no. 12, p. 34, 1999.
    • (1999) Security Management , vol.43 , Issue.12 , pp. 34
    • Shaw, E.D.1    Post, J.M.2    Ruby, K.G.3
  • 66
    • 58149425798 scopus 로고
    • A theory of human motivation
    • A. H. Maslow, "A theory of human motivation," Psychological Review, vol. 50, no. 4, pp. 370-396, 1943.
    • (1943) Psychological Review , vol.50 , Issue.4 , pp. 370-396
    • Maslow, A.H.1
  • 67
    • 84886876579 scopus 로고    scopus 로고
    • Insider threats: Strategies for prevention, mitigation, and response
    • [Online]. Available
    • C. W. Probst, J. Hunker, M. Bishop, L. Coles-Kemp, and D. Gollmann, "Insider threats: Strategies for prevention, mitigation, and response," Dagstuhl Seminar Proceedings, 2010. [Online]. Available: http://drops.dagstuhl.de/opus/volltexte/2010/2903
    • (2010) Dagstuhl Seminar Proceedings
    • Probst, C.W.1    Hunker, J.2    Bishop, M.3    Coles-Kemp, L.4    Gollmann, D.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.