Techniques and countermeasures for preventing insider threats.

Insider threat prevention Rigorous literature review Theoretical and empirical aspects Security and privacy

Journal

PeerJ. Computer science
ISSN: 2376-5992
Titre abrégé: PeerJ Comput Sci
Pays: United States
ID NLM: 101660598

Informations de publication

Date de publication:
2022
Historique:
received: 07 04 2021
accepted: 09 03 2022
entrez: 2 5 2022
pubmed: 3 5 2022
medline: 3 5 2022
Statut: epublish

Résumé

With the wide use of technologies nowadays, various security issues have emerged. Public and private sectors are both spending a large portion of their budget to protect the confidentiality, integrity, and availability of their data from possible attacks. Among these attacks are insider attacks which are more serious than external attacks, as insiders are authorized users who have legitimate access to sensitive assets of an organization. As a result, several studies exist in the literature aimed to develop techniques and tools to detect and prevent various types of insider threats. This article reviews different techniques and countermeasures that are proposed to prevent insider attacks. A unified classification model is proposed to classify the insider threat prevention approaches into two categories (biometric-based and asset-based metric). The biometric-based category is also classified into (physiological, behavioral and physical), while the asset metric-based category is also classified into (host, network and combined). This classification systematizes the reviewed approaches that are validated with empirical results utilizing the grounded theory method for rigorous literature review. Additionally, the article compares and discusses significant theoretical and empirical factors that play a key role in the effectiveness of insider threat prevention approaches (e.g., datasets, feature domains, classification algorithms, evaluation metrics, real-world simulation, stability and scalability,

Identifiants

pubmed: 35494800
doi: 10.7717/peerj-cs.938
pii: cs-938
pmc: PMC9044369
doi:

Types de publication

Journal Article

Langues

eng

Pagination

e938

Informations de copyright

©2022 Alsowail and Al-Shehari.

Déclaration de conflit d'intérêts

The authors declare there are no competing interests.

Références

J Exp Psychol Appl. 2001 Sep;7(3):219-26
pubmed: 11676100
Biomed Tech (Berl). 2013 Sep 7;58 Suppl 1:
pubmed: 24042816
IEEE Trans Dependable Secure Comput. 2012 May;9(3):332-344
pubmed: 24489520

Auteurs

Rakan A Alsowail (RA)

Computer Skills, Self-Development Department, Deanship of Common First Year, King Saud University, Riyadh, Saudi Arabia.

Taher Al-Shehari (T)

Computer Skills, Self-Development Department, Deanship of Common First Year, King Saud University, Riyadh, Saudi Arabia.

Classifications MeSH