Survey on Insider Threat Detection Method
CSTR:
Author:
Affiliation:

1.Command and Control Engineering College, Army Engineering University of PLA, Nanjing 210007, China;2.Evaluation Center, Academy of Military Science, Beijing 100091, China;3.Advanced Institute of Big Data, Beijing 100091, China;4.Defense Innovation Institute, Academy of Military Science, Beijing 100010, China

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    The internal network of the organization is not only faced with the threat of external attackers, but also faced with the insider threat including destruction of the organization network structure, internal information theft and various means of fraud. Because of the characteristics of concealment, destructiveness and diversification of attack methods, the insider threat poses a serious threat to the internal network. Therefore, it is very necessary to study the detection methods of insider threat. This paper analyzes the characteristics of insider threat and expounds the significance of studying the detection methods of insider threat. The existing insider threat detection methods are divided into three categories, namely, detection methods based on abnormal behavior, detection methods based on abnormal audit diary, and other detection methods. The current research status of each aspect is introduced respectively, and the progress of the research status of each aspect is summarized and analyzed.At last, the future research direction of insider threat detection methods is prospected.

    Reference
    Related
    Cited by
Get Citation

GUO Shize, ZHANG Lei, PAN Yu, TAO Wei, BAI Wei, ZHENG Qibin, LIU Yi, PAN Zhisong. Survey on Insider Threat Detection Method[J].,2022,37(3):488-501.

Copy
Related Videos

Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:August 12,2021
  • Revised:April 24,2022
  • Adopted:
  • Online: May 25,2022
  • Published:
Article QR Code