Visible to the public Complexity of Insider Attacks to Databases

TitleComplexity of Insider Attacks to Databases
Publication TypeConference Paper
Year of Publication2017
AuthorsKul, Gokhan, Upadhyaya, Shambhu, Hughes, Andrew
Conference NameProceedings of the 2017 International Workshop on Managing Insider Security Threats
Date PublishedOctober 2017
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-5177-5
Keywordscomplexity analysis, composability, Human Behavior, insider threat, Metrics, pubcrawl, query intent, query logs, relational database security, resilience, Resiliency, security risk management, threat modeling
Abstract

Insider attacks are one of the most dangerous threats to an organization. Unfortunately, they are very difficult to foresee, detect, and defend against due to the trust and responsibilities placed on the employees. In this paper, we first define the notion of user intent, and construct a model for the most common threat scenario used in the literature that poses a very high risk for sensitive data stored in the organization's database. We show that the complexity of identifying pseudo-intents of a user is coNP-Complete in this domain, and launching a harvester insider attack within the boundaries of the defined threat model takes linear time while a targeted threat model is an NP-Complete problem. We also discuss about the general defense mechanisms against the modeled threats, and show that countering against the harvester insider attack model takes quadratic time while countering against the targeted insider attack model can take linear to quadratic time depending on the strategy chosen. Finally, we analyze the adversarial behavior, and show that launching an attack with minimum risk is also an NP-Complete problem.

URLhttps://dl.acm.org/doi/10.1145/3139923.3139927
DOI10.1145/3139923.3139927
Citation Keykul_complexity_2017