当前位置: X-MOL 学术Future Gener. Comput. Syst. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Understanding insiders in cloud adopted organizations: A survey on taxonomies, incident analysis, defensive solutions, challenges
Future Generation Computer Systems ( IF 7.5 ) Pub Date : 2024-04-25 , DOI: 10.1016/j.future.2024.04.033
Asha S. , Shanmugapriya D.

In cybersecurity, one of the most significant challenges is an insider threat, in which existing researchers must provide an extensive solution aiming at an enhanced security network. This study proposes a comprehensive taxonomy as well as a state-of-the-art research categorization according to the contribution of insider threat incidents and the defensive mechanism utilized against such insiders. The major objective of a proposed categorization is to provide structural information in the field of insider threat based on past research theories for analyzing literature review. The proposed categorization is classified into four groups: (i) dataset analysis, (ii) incident analysis, (iii) defensive solution, and (iv) encountered challenges. However, the respective taxonomies and annotations are included for complete insight into insiders. i.e., existing studies on systematic taxonomy based on incidents of insider threats are presented. The major contribution of this study in the area of insider threat is to deliver the following knowledge to upcoming domain specific researchers: (i) taxonomy in an innovative systematic approach concerning the categories of incidents and determine the possible defensive mechanism against insiders. (ii) a study on available benchmark datasets used by existing research for evaluating the defensive mechanisms. (iii) a brief description of past solutions and frameworks to model insider behavior with the aim of studying existing defensive mechanisms, and (iv) a short discussion of challenges encountered by defensive solutions based on existing research in the area of insider threat.

中文翻译:


了解采用云的组织中的内部人员:关于分类法、事件分析、防御解决方案、挑战的调查



在网络安全中,最重大的挑战之一是内部威胁,现有研究人员必须提供旨在增强安全网络的广泛解决方案。本研究根据内部威胁事件的贡献和针对此类内部人员的防御机制,提出了全面的分类法和最先进的研究分类。拟议分类的主要目标是根据过去的研究理论来分析文献综述,提供内部威胁领域的结构信息。所提出的分类分为四组:(i)数据集分析,(ii)事件分析,(iii)防御解决方案,以及(iv)遇到的挑战。但是,包含了相应的分类法和注释,以便全面了解内部人士。即,提出了基于内部威胁事件的系统分类的现有研究。这项研究在内部威胁领域的主要贡献是为即将到来的特定领域研究人员提供以下知识:(i)以创新的系统方法对事件类别进行分类,并确定针对内部人员的可能的防御机制。 (ii) 对现有研究用于评估防御机制的可用基准数据集进行研究。 (iii) 简要描述过去的内部行为模型解决方案和框架,旨在研究现有防御机制,以及 (iv) 基于内部威胁领域现有研究,对防御解决方案遇到的挑战进行简短讨论。
更新日期:2024-04-25
down
wechat
bug