Using attack trees to identify malicious attacks from authorized insiders

109Citations
Citations of this article
79Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

A major concern for computer systems security is the threat from malicious insiders who execute perfectly legitimate operations to compromise system security. Unfortunately, most currently available intrusion detection systems (which include anomaly and misuse detection systems) fail to address this problem in a comprehensive manner. In this work we propose a framework that uses an attack tree to identify malicious activities from authorized insiders. We develop algorithms to generate minimal forms of attack tree customized for each user such that it can be used efficiently to monitor the user's activities. If the user's activities progress sufficiently up along the branches of the attack tree towards the goal of system compromise, we generate an alarm. Our system is not intended to replace existing intrusion detection and prevention technology, but rather is intended to complement current and future technology. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Ray, I., & Poolsapassit, N. (2005). Using attack trees to identify malicious attacks from authorized insiders. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3679 LNCS, pp. 231–246). https://doi.org/10.1007/11555827_14

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free