Advances in Wireless Communications and Networks

| Peer-Reviewed |

Hybrid Insider Cyber Security Threats Mitigation Scheme Using ECC and Behavoural Analysis Methodology

Received: 03 December 2016    Accepted: 23 December 2016    Published: 04 July 2017
Views:       Downloads:

Share This Article

Abstract

The last decade has been characterized by many organizations making it their priority to embrace digital technologies in running their services. Cyberspace has hugely dominated how organizations use electronics and the electromagnetic spectrum to manipulate, and exchange data via interconnected systems. Due to cyber space’s great dependence on informatics and telecommunications for almost every activity and service, it’s extremely catastrophic to ignore the growing phenomenon of cybercrimes and the increasing number of threats to organizations’ systems. The threat to enterprises from insider activities is increasing, getting worse and that significant losses are being incurred. ESG research indicates that more than half (54%) of IT and security professionals believe that insider threats are more difficult to detect or even prevent today than they were in 2011 (Jon Oltsik, 2013). While many organizations focus their security efforts on their network border via excellently configured firewall systems, it is actually the insider who perhaps poses the most risk to cyber-security. Even the existence of some personnel can be at stake if the data is leaked. Cyber Security takes many forms and the range and nature of threat is so varied that there just isn’t any getting away from the fact that it will require a multi-faceted solution. This paper suggests a hybrid framework aimed at guiding the management in coming up with a near real time mitigation solution that can be used to mitigate (Detecting, Preventing and Responding) the dynamic enigma of insider threats. The framework is based on behavioral variation analysis in conjunction with the use of technical techniques. We tried to change the landscape by adding the technological and behavioral equivalent of security cameras or additional lighting, and see whether the resulting uncertainty will eradicate the risk of attack in the cyber space.

DOI 10.11648/j.awcn.20170304.11
Published in Advances in Wireless Communications and Networks (Volume 3, Issue 4, July 2017)
Page(s) 29-38
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

Cyberspace, Mitigation, Cybercrime, Elliptic Curve Cryptography, Public Key, Private Key

References
[1] (DHS), T. D. (2 May 2014). Combating the Insider Threat. National Cyber Security and Communications Integraton Center, 1.
[2] (SEI), C. D. (n.d.). Insider Threat. Retrieved July 13, 2014, from CERT: http://www.cert.org/insider-threat.
[3] Software Engineering Institute - CERT Division. (2014, July 01). Retrieved September 23, 2014, from CERT: http://www.cert.org/insider-threat/research/controls-and-indicators.cfm?
[4] Christian W. Probst, J. H. (2010). Insider threats in Cyber security. New York: Springer Science.
[5] David Leigh, L. H. (2011). Wikileaks, Inside Assange's war on secrecy. Newyork, NY 10107: United States PublicAffairs.
[6] Dawn Cappelli, A. M. (2012). The CERT Guide to Insider Threats; How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud). Pittsburgh,: Addison-Wesley Professional | ISBN: 9780321812575.
[7] E-Security, T. (2015, January). Thales E-Security. Retrieved January 02, 2015, from Thales e-Security: https://www.thales-esecurity.com/solutions/by-technology-focus/application-level-encryption.
[8] Foremski, T. (2013, November 14). Security startups are booming so why is enterprise security getting worse? Retrieved December 18, 2014, from ZDNet: http://www.zdnet.com/article/security-startups-are-booming-so-why-is-enterprise-security-getting-worse/.
[9] Hunker, J. (2010). Insiders and Insider Threats. An Overview of Definitions and Mitigation Techniques, 10.
[10] Jamie, M. (2013, May 03). 58% Information Security Incidents Attributed to Insider Threat. Info Security Magazine, 3.
[11] Jon Oltsik, S. P. (2013). The Ominous State of Insider Threats. 2013 Vormetric/ESG Insider Threats Survey, 3.
[12] Kothari, C. (2011). Research Methodology. New Age International.
[13] Mellon, U. C. (2013). Unintentional Insider Threats:. Software Engineering Insitute, ix.
[14] Olzak, T. (2013, February 21). Insider threats: Implementing the right controls. Retrieved October 20, 2014, from Tech Republic: http://www.techrepublic.com/blog/it-security/insider-threats-implementing-the-right-controls/.
[15] Pfleeger, C. P. (2007). Reflections on the Insider Threat. New York City: Springer.
[16] Rouse, M. (2010). insider threat. Retrieved November 10, 2014, from insider threat: http://www.techtarget.com/contributor/Margaret-Rouse.
[17] Rouse, M. (2010). Insider threat. Retrieved November 10, 2014, from Whatis.com: http://searchsecurity.techtarget.com/definition/insider-threat.
[18] Silowash, G., Dawn, C., P. Moore, A., F. Trzeciak, R., J. Shimeall,. T., & Flynn, L. (2012). Common Sense Guide to Mitigating Insider Threats, 4th Edition December. Carnegie Mellon: Software Engineering Institute.
[19] Thibodeaux, T. (2014, Dec 16). Talkin Cloud. Retrieved December 18, 2014, from http://www.talkincloud.com: http://talkincloud.com/cloud-computing/12162014/changing-cso-role-what-expect-2015.
[20] Vometric. (2012). Securing Sensitive Data. Technical White Paper, 04-06.
[21] Westervelt, R. (2013, January 02). Dynamic Computer Corporation. Retrieved 07 18, 2014, from dcc-online: http://dcc-online.com/wordpress/?p=604.
[22] Westervelt, R. (2013, December 20). Top 5 Technologies That Detect Insider Threats. Retrieved September 20, 2014, from The Channel Company: http://www.crn.com/slide-shows/security/240164945/top-5-technologies-that-detect-insider-threats.htm/pgno/0/4.
[23] Wikipedia. (n.d.). Retrieved from http://en.wikipedia.org/wiki/Insider_threat.
[24] Zeadally, S. (2012). Detecting Insider Threats: Solutions and Trends. Information Security Journal: A Global Perspective, 1-2.
Author Information
  • Department of Computing, School of Computing and Information Technology, Jomo Kenyatta University of Agriculture and Technology, Nairobi, Kenya

  • Department of Computing, School of Computing and Information Technology, Jomo Kenyatta University of Agriculture and Technology, Nairobi, Kenya

  • Department of Computing, School of Computing and Information Technology, Jomo Kenyatta University of Agriculture and Technology, Nairobi, Kenya

Cite This Article
  • APA Style

    Stephen M. Musili, Michael Kimwele, Richard Rimiru. (2017). Hybrid Insider Cyber Security Threats Mitigation Scheme Using ECC and Behavoural Analysis Methodology. Advances in Wireless Communications and Networks, 3(4), 29-38. https://doi.org/10.11648/j.awcn.20170304.11

    Copy | Download

    ACS Style

    Stephen M. Musili; Michael Kimwele; Richard Rimiru. Hybrid Insider Cyber Security Threats Mitigation Scheme Using ECC and Behavoural Analysis Methodology. Adv. Wirel. Commun. Netw. 2017, 3(4), 29-38. doi: 10.11648/j.awcn.20170304.11

    Copy | Download

    AMA Style

    Stephen M. Musili, Michael Kimwele, Richard Rimiru. Hybrid Insider Cyber Security Threats Mitigation Scheme Using ECC and Behavoural Analysis Methodology. Adv Wirel Commun Netw. 2017;3(4):29-38. doi: 10.11648/j.awcn.20170304.11

    Copy | Download

  • @article{10.11648/j.awcn.20170304.11,
      author = {Stephen M. Musili and Michael Kimwele and Richard Rimiru},
      title = {Hybrid Insider Cyber Security Threats Mitigation Scheme Using ECC and Behavoural Analysis Methodology},
      journal = {Advances in Wireless Communications and Networks},
      volume = {3},
      number = {4},
      pages = {29-38},
      doi = {10.11648/j.awcn.20170304.11},
      url = {https://doi.org/10.11648/j.awcn.20170304.11},
      eprint = {https://download.sciencepg.com/pdf/10.11648.j.awcn.20170304.11},
      abstract = {The last decade has been characterized by many organizations making it their priority to embrace digital technologies in running their services. Cyberspace has hugely dominated how organizations use electronics and the electromagnetic spectrum to manipulate, and exchange data via interconnected systems. Due to cyber space’s great dependence on informatics and telecommunications for almost every activity and service, it’s extremely catastrophic to ignore the growing phenomenon of cybercrimes and the increasing number of threats to organizations’ systems. The threat to enterprises from insider activities is increasing, getting worse and that significant losses are being incurred. ESG research indicates that more than half (54%) of IT and security professionals believe that insider threats are more difficult to detect or even prevent today than they were in 2011 (Jon Oltsik, 2013). While many organizations focus their security efforts on their network border via excellently configured firewall systems, it is actually the insider who perhaps poses the most risk to cyber-security. Even the existence of some personnel can be at stake if the data is leaked. Cyber Security takes many forms and the range and nature of threat is so varied that there just isn’t any getting away from the fact that it will require a multi-faceted solution. This paper suggests a hybrid framework aimed at guiding the management in coming up with a near real time mitigation solution that can be used to mitigate (Detecting, Preventing and Responding) the dynamic enigma of insider threats. The framework is based on behavioral variation analysis in conjunction with the use of technical techniques. We tried to change the landscape by adding the technological and behavioral equivalent of security cameras or additional lighting, and see whether the resulting uncertainty will eradicate the risk of attack in the cyber space.},
     year = {2017}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Hybrid Insider Cyber Security Threats Mitigation Scheme Using ECC and Behavoural Analysis Methodology
    AU  - Stephen M. Musili
    AU  - Michael Kimwele
    AU  - Richard Rimiru
    Y1  - 2017/07/04
    PY  - 2017
    N1  - https://doi.org/10.11648/j.awcn.20170304.11
    DO  - 10.11648/j.awcn.20170304.11
    T2  - Advances in Wireless Communications and Networks
    JF  - Advances in Wireless Communications and Networks
    JO  - Advances in Wireless Communications and Networks
    SP  - 29
    EP  - 38
    PB  - Science Publishing Group
    SN  - 2575-596X
    UR  - https://doi.org/10.11648/j.awcn.20170304.11
    AB  - The last decade has been characterized by many organizations making it their priority to embrace digital technologies in running their services. Cyberspace has hugely dominated how organizations use electronics and the electromagnetic spectrum to manipulate, and exchange data via interconnected systems. Due to cyber space’s great dependence on informatics and telecommunications for almost every activity and service, it’s extremely catastrophic to ignore the growing phenomenon of cybercrimes and the increasing number of threats to organizations’ systems. The threat to enterprises from insider activities is increasing, getting worse and that significant losses are being incurred. ESG research indicates that more than half (54%) of IT and security professionals believe that insider threats are more difficult to detect or even prevent today than they were in 2011 (Jon Oltsik, 2013). While many organizations focus their security efforts on their network border via excellently configured firewall systems, it is actually the insider who perhaps poses the most risk to cyber-security. Even the existence of some personnel can be at stake if the data is leaked. Cyber Security takes many forms and the range and nature of threat is so varied that there just isn’t any getting away from the fact that it will require a multi-faceted solution. This paper suggests a hybrid framework aimed at guiding the management in coming up with a near real time mitigation solution that can be used to mitigate (Detecting, Preventing and Responding) the dynamic enigma of insider threats. The framework is based on behavioral variation analysis in conjunction with the use of technical techniques. We tried to change the landscape by adding the technological and behavioral equivalent of security cameras or additional lighting, and see whether the resulting uncertainty will eradicate the risk of attack in the cyber space.
    VL  - 3
    IS  - 4
    ER  - 

    Copy | Download

  • Sections