Where can an Insider attack? | Christian W. Probst, Rene Rydhoff Hansen, Flemming Nielson
| Abstract | By definition, an insider has better access, is more trusted, and
has better information about internal procedures, high-value
targets, and potential weak spots in the security, than an outsider.
Consequently, an insider attack has the potential to cause
significant, even catastrophic, damage to the targeted
organisation.
While the problem is well recognised in the security community as
well as in law-enforcement and intelligence communities, the main
resort still is to audit log files \emph{after the fact}.
There has
been little research into developing models, automated tools, and
techniques for analysing and solving (parts of) the problem.
In this paper we first develop a formal model of systems, that can
describe real-world scenarios. These high-level models are then
mapped to acKlaim, a process algebra with support for access
control, that is used to study and analyse properties of the
modelled systems. Our analysis of processes identifies which
actions may be performed by whom, at which locations, accessing
which data. This allows to compute a superset of audit
results---before an incident occurs. | Keywords | process calculus, insider threat, system modelling, static analysis | Type | Conference paper [With referee] | Conference | Workshop on Formal Aspects in Security and Trust (FAST 2006) | Year | 2006 Month August | BibTeX data | [bibtex] | IMM Group(s) | Computer Science & Engineering |
|