DocumentCode :
3153199
Title :
Protecting information systems from insider threats - concepts and issues
Author :
Bertino, Elisa
Author_Institution :
Computer Science, Purdue University, USA
fYear :
2011
fDate :
3-5 Aug. 2011
Abstract :
Summary form only given. Past research on information security has focused on protecting valuable resources from attacks by outsiders. However, statistics show that a large amount of security and privacy breaches are due to insider attacks. Protection from insider threats is challenging because insiders may have access to many sensitive resources and high-privileged system accounts. Suitable approaches need to combine several security techniques, like fine-grained access control, stronger authentication protocols, integrated digital identity management, intrusion detection, with techniques from areas like information integration, machine learning, and risk assessment. In this talk, after an introduction to the problem of insider threats, we will present recent work addressing the problem of anomaly detection and response policies for database management systems and then discuss open research issues, by emphasizing the role of techniques from the area of information integration.
Keywords :
authorisation; data privacy; database management systems; information systems; learning (artificial intelligence); risk management; anomaly detection; database management systems; fine-grained access control; information integration; information security; information system protection; insider threats; integrated digital identity management; intrusion detection; machine learning; privacy breaches; risk assessment; security breaches; stronger authentication protocols;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Reuse and Integration (IRI), 2011 IEEE International Conference on
Conference_Location :
Las Vegas, NV
Print_ISBN :
978-1-4577-0964-7
Electronic_ISBN :
978-1-4577-0965-4
Type :
conf
DOI :
10.1109/IRI.2011.6009503
Filename :
6009503
Link To Document :
بازگشت