Insider Attack Identification and Prevention in Collection-Oriented Dataflow-Based Processes

Anandarup Sarkar, Sven Köhler, Bertram Ludäscher, Matt Bishop

Research output: Contribution to journalArticlepeer-review

Abstract

We introduce an approach of automatically identifying attacks by insider agents on dataflow-based processes having a collection-oriented data model and then improving the processes to prevent the attacks against them. Some process data, if used by some agents via steps at certain points of timeline, will lead to a privacy attack. A manual identification of these vulnerable data and rogue agents is quite tedious; thus, our approach automatically performs these identifications. We model a process and an attack based on a directed acyclic graph, with steps, reading and writing data, and controlled by agents. Then, we perform a declarative implementation to find out if this attack model can be mapped onto the process model based on some similarity criteria. If these criteria are met, we conclude that the attack model is 'similar enough' to the process model to be successfully realized through it. Each possible way of mapping shows an avenue of attack on the process. Agent collusion scenarios are also identified. Finally, our approach automatically identifies process improvement opportunities and iteratively exploits them, thereby eliminating attack avenues.

Original languageEnglish (US)
Pages (from-to)522-533
Number of pages12
JournalIEEE Systems Journal
Volume11
Issue number2
DOIs
StatePublished - Jun 2017

Keywords

  • Data privacy
  • graphical models
  • human factors
  • logic programming

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Information Systems
  • Computer Science Applications
  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Insider Attack Identification and Prevention in Collection-Oriented Dataflow-Based Processes'. Together they form a unique fingerprint.

Cite this