A Review of Insider Threat Detection Approaches With IoT Perspective
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Aram | - |
dc.contributor.author | Oh, Junhyoung | - |
dc.contributor.author | Ryu, Jinho | - |
dc.contributor.author | Lee, Kyungho | - |
dc.date.accessioned | 2021-08-31T15:59:00Z | - |
dc.date.available | 2021-08-31T15:59:00Z | - |
dc.date.created | 2021-06-19 | - |
dc.date.issued | 2020 | - |
dc.identifier.issn | 2169-3536 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/58938 | - |
dc.description.abstract | Security professionals, government agencies, and corporate organizations have found an inherent need to prevent or mitigate attacks from insider threats. Accordingly, active research on insider threat detection has been conducted to prevent and mitigate adverse effects such as leakage of valuable information that may be caused by insiders. Along with the growth of Internet-of-Things (IoT), new security challenges arise in the existing security frameworks. Attack surfaces are significantly enlarged which could cause a severe risk in terms of company insider threat management. In this work, we provide a generalization of aspects of insider threats with IoT and analyze the surveyed literature based on both private and public sources. We then examine data sources considering IoT environments based on the characteristics and the structure of IoT (perceptual, network, and application layers). The result of reviewing the study shows that using the data source of the network and application layer is more suitable than the perceptual layer in the IoT environment. We also categorized each layer's data sources according to their features, and we investigated research objectives and methods for each category. Finally, the potential for utilization and limitations under the IoT environment are presented at the end of each layer examination. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
dc.subject | ATTACK DETECTION | - |
dc.subject | INTERNET | - |
dc.subject | THINGS | - |
dc.title | A Review of Insider Threat Detection Approaches With IoT Perspective | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lee, Kyungho | - |
dc.identifier.doi | 10.1109/ACCESS.2020.2990195 | - |
dc.identifier.scopusid | 2-s2.0-85084802174 | - |
dc.identifier.wosid | 000531907900003 | - |
dc.identifier.bibliographicCitation | IEEE ACCESS, v.8, pp.78847 - 78867 | - |
dc.relation.isPartOf | IEEE ACCESS | - |
dc.citation.title | IEEE ACCESS | - |
dc.citation.volume | 8 | - |
dc.citation.startPage | 78847 | - |
dc.citation.endPage | 78867 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | ATTACK DETECTION | - |
dc.subject.keywordPlus | INTERNET | - |
dc.subject.keywordPlus | THINGS | - |
dc.subject.keywordAuthor | Insider threat detection | - |
dc.subject.keywordAuthor | Internet-of-Things | - |
dc.subject.keywordAuthor | dataset | - |
dc.subject.keywordAuthor | survey | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
145 Anam-ro, Seongbuk-gu, Seoul, 02841, Korea+82-2-3290-2963
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.