A Framework for Data-Driven Physical Security and Insider Threat Detection

09/25/2018
by   Vasileios Mavroeidis, et al.
0

This paper presents PS0, an ontological framework and a methodology for improving physical security and insider threat detection. PS0 can facilitate forensic data analysis and proactively mitigate insider threats by leveraging rule-based anomaly detection. In all too many cases, rule-based anomaly detection can detect employee deviations from organizational security policies. In addition, PS0 can be considered a security provenance solution because of its ability to fully reconstruct attack patterns. Provenance graphs can be further analyzed to identify deceptive actions and overcome analytical mistakes that can result in bad decision-making, such as false attribution. Moreover, the information can be used to enrich the available intelligence (about intrusion attempts) that can form use cases to detect and remediate limitations in the system, such as loosely-coupled provenance graphs that in many cases indicate weaknesses in the physical security architecture. Ultimately, validation of the framework through use cases demonstrates and proves that PS0 can improve an organization's security posture in terms of physical security and insider threat detection.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/12/2020

Rule-based Anomaly Detection for Railway Signalling Networks

We propose a rule-based anomaly detection system for railway signalling ...
research
03/08/2019

ABC: A Cryptocurrency-Focused Threat Modeling Framework

Cryptocurrencies are an emerging economic force, but there are concerns ...
research
09/23/2021

DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications

Unsupervised Deep Learning (DL) techniques have been widely used in vari...
research
10/16/2009

An Immune Inspired Approach to Anomaly Detection

The immune system provides a rich metaphor for computer security: anomal...
research
09/01/2018

A Graph Based Framework for Malicious Insider Threat Detection

While most security projects have focused on fending off attacks coming ...
research
08/27/2021

Rule-based Adaptations to Control Cybersickness in Social Virtual Reality Learning Environments

Social virtual reality learning environments (VRLEs) provide immersive e...
research
03/07/2020

ATHAFI: Agile Threat Hunting And Forensic Investigation

Attackers rapidly change their attacks to evade detection. Even the most...

Please sign up or login with your details

Forgot password? Click here to reset