A systematic literature review on insider threats

12/10/2022
by   Angad Pal Singh, et al.
0

Insider threats is the most concerned cybersecurity problem which is poorly addressed by widely used security solutions. Despite the fact that there have been several scientific publications in this area, but from our innovative study classification and structural taxonomy proposals, we argue to provide the more information about insider threats and defense measures used to counter them. While adopting the current grounded theory method for a thorough literature evaluation, our categorization's goal is to organize knowledge in insider threat research. Along with an analysis of major recent studies on detecting insider threats, the major goal of the study is to develop a classification of current types of insiders, levels of access, motivations behind it, insider profiling, security properties, and methods they use to attack. This includes use of machine learning algorithm, behavior analysis, methods of detection and evaluation. Moreover, actual incidents related to insider attacks have also been analyzed.

READ FULL TEXT

page 3

page 6

research
05/04/2018

Insight into Insiders: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures

Insider threats are one of today's most challenging cybersecurity issues...
research
03/16/2020

Securing Microservices and Microservice Architectures: A Systematic Mapping Study

Microservice architectures are becoming trending alternatives to existin...
research
01/25/2020

A Review of Cybersecurity Incidents in the Water Sector

This study presents a critical review of disclosed, documented, and mali...
research
08/14/2020

First Step Towards Modeling Unbreakable Malware

Currently, the construction of concealed malicious code has become a tre...
research
01/18/2023

Review, Meta-Taxonomy, and Use Cases of Cyberattack Taxonomies of Manufacturing Cybersecurity Threat Attributes and Countermeasures

A thorough and systematic understanding of different elements of cyberat...
research
12/04/2020

Threats to the information system in the physical environment and cyberspace

The purpose of the study is to supplement and update the list of threats...
research
02/21/2019

Analysis of Recent Attacks based on Social Engineering Techniques

This paper attempts to strengthen the pursued research on social enginee...

Please sign up or login with your details

Forgot password? Click here to reset