Optimizing Data Misuse Detection

Author:

Shabtai Asaf1,Bercovitch Maya1,Rokach Lior1,Elovici Yuval1

Affiliation:

1. Ben-Gurion University of the Negev, Israel

Abstract

Data misuse may be performed by entities such as an organization's employees and business partners who are granted access to sensitive information and misuse their privileges. We assume that users can be either trusted or untrusted. The access of untrusted parties to data objects (e.g., client and patient records) should be monitored in an attempt to detect misuse. However, monitoring data objects is resource intensive and time-consuming and may also cause disturbance or inconvenience to the involved employees. Therefore, the monitored data objects should be carefully selected. In this article, we present two optimization problems carefully designed for selecting specific data objects for monitoring, such that the detection rate is maximized and the monitoring effort is minimized. In the first optimization problem, the goal is to select data objects for monitoring that are accessed by at most c trusted agents while ensuring access to at least k monitored objects by each untrusted agent (both c and k are integer variable). As opposed to the first optimization problem, the goal of the second optimization problem is to select monitored data objects that maximize the number of monitored data objects accessed by untrusted agents while ensuring that each trusted agent does not access more than d monitored data objects ( d is an integer variable as well). Two efficient heuristic algorithms for solving these optimization problems are proposed, and experiments were conducted simulating different scenarios to evaluate the algorithms’ performance. Moreover, we compared the heuristic algorithms’ performance to the optimal solution and conducted sensitivity analysis on the three parameters ( c , k , and d ) and on the ratio between the trusted and untrusted agents.

Funder

Deutsche Telekom Stiftung

Publisher

Association for Computing Machinery (ACM)

Subject

General Computer Science

Reference25 articles.

1. Wade H. Baker Maek Goudie Alexander Hutton David C. Hylender Jelle Niemantsverdriet Christopher Novak David Ostertag Christopher Porter Mike Rosen Bryan Sartin and Peter Tippett. 2010. 2010 Data Breach Investigation Report. Verizon Business RISK Team Verizon Business. Wade H. Baker Maek Goudie Alexander Hutton David C. Hylender Jelle Niemantsverdriet Christopher Novak David Ostertag Christopher Porter Mike Rosen Bryan Sartin and Peter Tippett. 2010. 2010 Data Breach Investigation Report. Verizon Business RISK Team Verizon Business.

2. Wade H. Baker Alexander Hutton David C. Hylender Christopher Novak Christopher Porter Bryan Sartin Peter Tippett and Andrew J. Valentine. 2009. 2009 Data Breach Investigation Report. Verizon Business RISK Team Verizon Business. Wade H. Baker Alexander Hutton David C. Hylender Christopher Novak Christopher Porter Bryan Sartin Peter Tippett and Andrew J. Valentine. 2009. 2009 Data Breach Investigation Report. Verizon Business RISK Team Verizon Business.

3. HoneyGen: An automated honeytokens generator

4. Siren: catching evasive malware

5. Brian M. Bowen Shlomo Hershkop Angelos D. Keromytis and Salvatore J. Stolfo. 2009a. Baiting inside attackers using decoy documents. In Security and Privacy in Communication Networks. Springer Berlin 51--70. Brian M. Bowen Shlomo Hershkop Angelos D. Keromytis and Salvatore J. Stolfo. 2009a. Baiting inside attackers using decoy documents. In Security and Privacy in Communication Networks. Springer Berlin 51--70.

Cited by 4 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Addressing privacy concerns with wearable health monitoring technology;WIREs Data Mining and Knowledge Discovery;2024-03-23

2. Technology-enabled leadership and performance enhancement outcomes: an empirical investigation from the dynamic capabilities perspective;Journal of Systems and Information Technology;2023-07-06

3. A Survey on Space-Air-Ground-Sea Integrated Network Security in 6G;IEEE Communications Surveys & Tutorials;2021

4. Behavioral Study of Users When Interacting with Active Honeytokens;ACM Transactions on Information and System Security;2016-04-14

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3