Hybrid Insider Cyber Security Threats Mitigation Scheme Using ECC and Behavoural Analysis Methodology
Advances in Wireless Communications and Networks
Volume 3, Issue 4, July 2017, Pages: 29-38
Received: Dec. 3, 2016; Accepted: Dec. 23, 2016; Published: Jul. 4, 2017
Views 1559      Downloads 78
Authors
Stephen M. Musili, Department of Computing, School of Computing and Information Technology, Jomo Kenyatta University of Agriculture and Technology, Nairobi, Kenya
Michael Kimwele, Department of Computing, School of Computing and Information Technology, Jomo Kenyatta University of Agriculture and Technology, Nairobi, Kenya
Richard Rimiru, Department of Computing, School of Computing and Information Technology, Jomo Kenyatta University of Agriculture and Technology, Nairobi, Kenya
Article Tools
Follow on us
Abstract
The last decade has been characterized by many organizations making it their priority to embrace digital technologies in running their services. Cyberspace has hugely dominated how organizations use electronics and the electromagnetic spectrum to manipulate, and exchange data via interconnected systems. Due to cyber space’s great dependence on informatics and telecommunications for almost every activity and service, it’s extremely catastrophic to ignore the growing phenomenon of cybercrimes and the increasing number of threats to organizations’ systems. The threat to enterprises from insider activities is increasing, getting worse and that significant losses are being incurred. ESG research indicates that more than half (54%) of IT and security professionals believe that insider threats are more difficult to detect or even prevent today than they were in 2011 (Jon Oltsik, 2013). While many organizations focus their security efforts on their network border via excellently configured firewall systems, it is actually the insider who perhaps poses the most risk to cyber-security. Even the existence of some personnel can be at stake if the data is leaked. Cyber Security takes many forms and the range and nature of threat is so varied that there just isn’t any getting away from the fact that it will require a multi-faceted solution. This paper suggests a hybrid framework aimed at guiding the management in coming up with a near real time mitigation solution that can be used to mitigate (Detecting, Preventing and Responding) the dynamic enigma of insider threats. The framework is based on behavioral variation analysis in conjunction with the use of technical techniques. We tried to change the landscape by adding the technological and behavioral equivalent of security cameras or additional lighting, and see whether the resulting uncertainty will eradicate the risk of attack in the cyber space.
Keywords
Cyberspace, Mitigation, Cybercrime, Elliptic Curve Cryptography, Public Key, Private Key
To cite this article
Stephen M. Musili, Michael Kimwele, Richard Rimiru, Hybrid Insider Cyber Security Threats Mitigation Scheme Using ECC and Behavoural Analysis Methodology, Advances in Wireless Communications and Networks. Vol. 3, No. 4, 2017, pp. 29-38. doi: 10.11648/j.awcn.20170304.11
Copyright
Copyright © 2017 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
References
[1]
(DHS), T. D. (2 May 2014). Combating the Insider Threat. National Cyber Security and Communications Integraton Center, 1.
[2]
(SEI), C. D. (n.d.). Insider Threat. Retrieved July 13, 2014, from CERT: http://www.cert.org/insider-threat.
[3]
Software Engineering Institute - CERT Division. (2014, July 01). Retrieved September 23, 2014, from CERT: http://www.cert.org/insider-threat/research/controls-and-indicators.cfm?
[4]
Christian W. Probst, J. H. (2010). Insider threats in Cyber security. New York: Springer Science.
[5]
David Leigh, L. H. (2011). Wikileaks, Inside Assange's war on secrecy. Newyork, NY 10107: United States PublicAffairs.
[6]
Dawn Cappelli, A. M. (2012). The CERT Guide to Insider Threats; How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud). Pittsburgh,: Addison-Wesley Professional | ISBN: 9780321812575.
[7]
E-Security, T. (2015, January). Thales E-Security. Retrieved January 02, 2015, from Thales e-Security: https://www.thales-esecurity.com/solutions/by-technology-focus/application-level-encryption.
[8]
Foremski, T. (2013, November 14). Security startups are booming so why is enterprise security getting worse? Retrieved December 18, 2014, from ZDNet: http://www.zdnet.com/article/security-startups-are-booming-so-why-is-enterprise-security-getting-worse/.
[9]
Hunker, J. (2010). Insiders and Insider Threats. An Overview of Definitions and Mitigation Techniques, 10.
[10]
Jamie, M. (2013, May 03). 58% Information Security Incidents Attributed to Insider Threat. Info Security Magazine, 3.
[11]
Jon Oltsik, S. P. (2013). The Ominous State of Insider Threats. 2013 Vormetric/ESG Insider Threats Survey, 3.
[12]
Kothari, C. (2011). Research Methodology. New Age International.
[13]
Mellon, U. C. (2013). Unintentional Insider Threats:. Software Engineering Insitute, ix.
[14]
Olzak, T. (2013, February 21). Insider threats: Implementing the right controls. Retrieved October 20, 2014, from Tech Republic: http://www.techrepublic.com/blog/it-security/insider-threats-implementing-the-right-controls/.
[15]
Pfleeger, C. P. (2007). Reflections on the Insider Threat. New York City: Springer.
[16]
Rouse, M. (2010). insider threat. Retrieved November 10, 2014, from insider threat: http://www.techtarget.com/contributor/Margaret-Rouse.
[17]
Rouse, M. (2010). Insider threat. Retrieved November 10, 2014, from Whatis.com: http://searchsecurity.techtarget.com/definition/insider-threat.
[18]
Silowash, G., Dawn, C., P. Moore, A., F. Trzeciak, R., J. Shimeall,. T., & Flynn, L. (2012). Common Sense Guide to Mitigating Insider Threats, 4th Edition December. Carnegie Mellon: Software Engineering Institute.
[19]
Thibodeaux, T. (2014, Dec 16). Talkin Cloud. Retrieved December 18, 2014, from http://www.talkincloud.com: http://talkincloud.com/cloud-computing/12162014/changing-cso-role-what-expect-2015.
[20]
Vometric. (2012). Securing Sensitive Data. Technical White Paper, 04-06.
[21]
Westervelt, R. (2013, January 02). Dynamic Computer Corporation. Retrieved 07 18, 2014, from dcc-online: http://dcc-online.com/wordpress/?p=604.
[22]
Westervelt, R. (2013, December 20). Top 5 Technologies That Detect Insider Threats. Retrieved September 20, 2014, from The Channel Company: http://www.crn.com/slide-shows/security/240164945/top-5-technologies-that-detect-insider-threats.htm/pgno/0/4.
[23]
Wikipedia. (n.d.). Retrieved from http://en.wikipedia.org/wiki/Insider_threat.
[24]
Zeadally, S. (2012). Detecting Insider Threats: Solutions and Trends. Information Security Journal: A Global Perspective, 1-2.
ADDRESS
Science Publishing Group
1 Rockefeller Plaza,
10th and 11th Floors,
New York, NY 10020
U.S.A.
Tel: (001)347-983-5186