Automatic derivation and validation of a cloud dataset for insider threat detection

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The malicious insider threat is often listed as one of the most dangerous cloud threats. Considering this threat, the main difference between a cloud computing scenario and a traditional IT infrastructure, is that once perpetrated, it could damage other clients due to the multi-tenancy and virtual environment cloud features. One of the related challenges concerns the fact that this threat domain is highly dependent on human behavior characteristics as opposed to the more purely technical domains of network data generation. In this paper, we focus on the derivation and validation of the dataset for cloud-based malicious insider threat. Accordingly, we outline the design of synthetic data, while discussing cloud-based indicators, and socio-technical human factors. As a proof of concept, we test our model on an airline scheduling application provided by a flight operator, together with proposing realistic threat scenarios for its future detection. The work is motivated by the complexity of the problem itself as well as by the absence of the open, realistic cloud-based datasets.

Original languageEnglish
Title of host publicationICSOFT 2017 - Proceedings of the 12th International Conference on Software Technologies
EditorsJorge Cardoso, Jorge Cardoso, Leszek Maciaszek, Leszek Maciaszek, Marten van Sinderen, Enrique Cabello
PublisherSciTePress
Pages480-487
Number of pages8
ISBN (Electronic)9789897582622
DOIs
Publication statusPublished - 1 Jan 2017
Externally publishedYes
Event12th International Conference on Software Technologies, ICSOFT 2017 - Madrid, Spain
Duration: 24 Jul 201726 Jul 2017

Publication series

NameICSOFT 2017 - Proceedings of the 12th International Conference on Software Technologies

Conference

Conference12th International Conference on Software Technologies, ICSOFT 2017
Country/TerritorySpain
CityMadrid
Period24/07/1726/07/17

Keywords

  • Cloud computing
  • Dataset
  • Dataset validation
  • Intrusion threat
  • Synthetic data generation
  • User behavior

Fingerprint

Dive into the research topics of 'Automatic derivation and validation of a cloud dataset for insider threat detection'. Together they form a unique fingerprint.

Cite this