Abstract
The handling of insider attacks is a significant technical challenge as little assurance theory and design practice exists to guide the design of effective, credible countermeasures for large systems and applications. Much of the relevant theory has focused on insider attacks on individual security protocols and smallscale applications. In this position paper, we suggest that confidence in a system’s resilience to insider attacks can emerge by the application of well-accepted survivability principles and design methods. We caution, however, that different tradeoffs emerge in applying these principles to practical designs, thereby requiring a careful balance among the costs of countering insider attacks, recovery from attack, and attack deterrence, and between the fine granularity of access permissions and ability to administer these permissions is a safe manner. In view of the dearth of practical solutions for surviving insider attacks in any significant-size system, we suggest that experiments in applying well-accepted principles and design methods to critical subsystems (e.g., user authentication, DNS) are necessary to provide effective and quantifiable assurances.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
A. Avizienis and J.-C. Laprie, “Dependable Computing: From Concepts to Design Diversity,” Proceedings of the IEEE, vol. 74, no. 5, May 1986.
A. Avizienis, J.-C. Laprie, B. Rendell, and C. Landwehr, “Basic Concepts and Taxonomy of Dependable and Secure Computing,” IEEE Transactions on Dependable and Secure Computing, vol.1, no. 1, Jan-Mar 2004
R. Bobba, S.I. Gavrila, V.D. Gligor, H. Khurana, and R. Koleva, “Administering Access Control in Dynamic Coalitions,” Proc. of the 19th USENIX Large Installation System Administration Conference (LISA), San Diego, CA, December 2005.
D. Boneh and M. Franklin, “Efficinet Generation of Shared RSA Keys,” Journal of the ACM (JACM), Vol. 48, Issue 4, July 2001
D. D. Clark and D.R. Wilson, “Evolution of a Model for Computer Security,” in Report of the Invitational Workshop on Data Integrity, Z. Ruthberg and W.T. Polk (eds.) NIST Special Publication 500=168, Appendix A, September 1989.
V.D. Gligor, S. I. Gavrila and D. Ferraiolo, “On the Formal Definition of Separation-of-Duty Policies and their Composition,” IEEE Symposium on Security and Privacy, Oakland, California, May 1998, pp. 172-185.
J. Gray, “The Transaction Concept: Virtues and Limitations,” Proceedings of the VLDB, Cannes, France, 1981.
P. Gupta, V. Shmatikov. Key Confirmation and Adaptive Corruptions in the Protocol Security Logic,” Joint Workshop on Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis Seattle, August 15 - 16, 2006
M.S. Hecht, M.E. Carson, C.S. Chandersekaran, R.S. Chapman, L.J. Dotterer, V.D. Gligor, W.D. Jiang, A. Johri, G. L. Luckenbaugh, and N. Vasudevan, “Unix without the Superuser,” Proc. of the USENIX Conference, Phoenix, Arizona, June 1987, pp. 243-256.
J. Katz, R. Ostrovsky and M. Yung, “Efficient Password-Based Authenticated Key Exchange Using Human-Memorable Passwords,” Advanced in Cryptography - Eurocrypt 2001, Innsbruck, Austria, May 2001.
"Two-Server Password-Only Authenticated Key Exchange," J. Katz, P. MacKenzie, G.Taban, and V. Gligor, in Proccedings of Applied Cryptography and Network Security (ACNS), N.Y. 2005
H. Khurana, V.D. Gligor, and J. Linn, “Reasoning about Joint Administration of Access Policies for Coalition Resources,” Proc. of the IEEE International Conference for Distributed Computer Systems - ICDCS, Vienna, Austria, July 2002.
National Security Agency, “A Guide to Understanding Trusted Facility Management,” National Computer Security Center, NCSC-TG-015, Version 1, 1989.
National Security Agency, “A Guide to Understanding Audit in Trusted Systems,” National Computer Security Center, NCSC-TG-001, Version 1, 1988
P. G. Neumann, “Principled Assuredly Trustworthy Compusable Architectures,” DARPA Final Report, SRI Project P11459, December 28, 2004.
R. Reeder and R. Maxion, “User Interface Dependability through Goal-Error Prevention,” International Conference on Dependable Systems and Networks, Yokohama, Japan, June 2005.
J. H. Saltzer and M.D. Schroeder, “The Protection of Information in Computer Systems, “ Proccedings of the IEEE, vol. 63, no. 9, Sept. 1975.
R. T. Simon and M.E. Zurko, “Separation of Duty in Role-Based Environments,” Proceedings of the Computer Security Foundations Workshop, Rockport, Mass. June 1997.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Gligor, V.D., Chandersekaran, C.S. (2008). Surviving Insider Attacks: A Call for System Experiments. In: Stolfo, S.J., Bellovin, S.M., Keromytis, A.D., Hershkop, S., Smith, S.W., Sinclair, S. (eds) Insider Attack and Cyber Security. Advances in Information Security, vol 39. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-77322-3_9
Download citation
DOI: https://doi.org/10.1007/978-0-387-77322-3_9
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-77321-6
Online ISBN: 978-0-387-77322-3
eBook Packages: Computer ScienceComputer Science (R0)