On the possibility of insider threat prevention using intent-based access control (IBAC)

A Almehmadi, K El-Khatib - IEEE Systems Journal, 2015 - ieeexplore.ieee.org
IEEE Systems Journal, 2015ieeexplore.ieee.org
Existing access control mechanisms are based on the concept of identity enrolment and
recognition and assume that recognized identity is a synonym to ethical actions, yet statistics
over the years show that the most severe security breaches are the results of trusted,
identified, and legitimate users who turned into malicious insiders. Insider threat damages
vary from intellectual property loss and fraud to information technology sabotage. As insider
threat incidents evolve, there exist demands for a nonidentity-based authentication measure …
Existing access control mechanisms are based on the concept of identity enrolment and recognition and assume that recognized identity is a synonym to ethical actions, yet statistics over the years show that the most severe security breaches are the results of trusted, identified, and legitimate users who turned into malicious insiders. Insider threat damages vary from intellectual property loss and fraud to information technology sabotage. As insider threat incidents evolve, there exist demands for a nonidentity-based authentication measure that rejects access to authorized individuals who have mal-intents of access. In this paper, we study the possibility of using the user's intention as an access control measure using the involuntary electroencephalogram reactions toward visual stimuli. We propose intent-based access control (IBAC) that detects the intentions of access based on the existence of knowledge about an intention. IBAC takes advantage of the robustness of the concealed information test to assess access risk. We use the intent and intent motivation level to compute the access risk. Based on the calculated risk and risk accepted threshold, the system makes the decision whether to grant or deny access requests. We assessed the model using experiments on 30 participants that proved the robustness of the proposed solution.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果

Google学术搜索按钮

example.edu/paper.pdf
搜索
获取 PDF 文件
引用
References