EndpointProtection IEEEVersion
EndpointProtection IEEEVersion
net/publication/338364311
CITATIONS READS
10 3,136
5 authors, including:
Sonali Chandel
New York Institute of Technology
14 PUBLICATIONS 213 CITATIONS
SEE PROFILE
All content following this page was uploaded by Sonali Chandel on 06 January 2020.
Endpoint Protection
Measuring the effectiveness of remediation technologies and methodologies for
insider threat
Sonali Chandel, Sun Yu, Tang Yitian, Zhou Zhili, Huang Yusheng
College of Engineering and Computing Sciences, New York Institute of Technology, Nanjing, China
{schandel, ysun33, ytang11, zzhou23, yhuang66}@nyit.edu
Abstract - With the increase in the incidences of data leakage, While many large organizations take a more
enterprises have started to realize that the endpoints (especially sophisticated approach towards endpoint security by using
mobile devices) used by their employees are the primary cause different, specialized products for the tasks of prevention,
of data breach in most of the cases. Data shows that employee detection, and response, a growing trend in implementing a
training, which aims to promote the awareness of protecting the single, “all-in-one” solution enables centralized management
sensitive data of the organization is not very useful. Besides, of multiple security functions instead [3]. Companies are
popular third-party cloud services make it even more difficult always looking for the software that contains all the tasks
for employees to keep the secrets of their workplace safer. This mentioned above so that it could help them defend the threat.
pressing issue has caused the emergence of a significant market
for various software products that provide endpoint data For IT decision-makers, the present time is very crucial
protection for these organizations. Our study will discuss some for increased investment in stronger endpoint protection. Of
methods and technologies that deal with traditional, negative 113 respondents in the 2018 Endpoint Security Spending
endpoint protection: Endpoint protection platform (EPP), and Priorities Survey, conducted by Barkly, advanced malware
another new, positive endpoint protection: Endpoint detection protection and prevention was by far the highest priority for
and response (EDR). The comparison and evaluation between most companies in 2018. [4]. According to 2018 Insider
EPP and EDR in mechanism and effectiveness will also be shown. Threat report, among the companies that were surveyed, at
The study also aims to analyze the merits, faults, and key least 27% agreed that the insider threat is causing much more
features that an excellent protection software should have. The
damage than ever before that too at a higher frequency. In the
objective of this paper is to assist small-scale and big-scale
companies to improve their understanding of insider threats in
same report, 53% of companies also reported that they had
such rapidly developing cyberspace, which is full of potential experienced an insider attack more than once in the last year
risks and attacks. This will also help the companies to have better or so [5].
control over their employee’s endpoint to be able to avoid any Insider threat is a generic term used for a threat to an
future data leaks. It will also help negligent users to comprehend organization's security or data that comes mostly from within
how serious is the problem that they are faced with, and how they the organization [6]. For many companies, the security of
should be careful in handling their privacy when they are surfing
information is the most significant. At the same time, insider
the Internet while being connected to the company’s network.
This paper aims to contribute to further research on endpoint
threats are the biggest target for hackers. Because they are hard
detection and protection or some similar topics by trying to to detect and can easily be manipulated to breach the firewalls
predict the future of protection products. in use. Many hackers target insiders to steal data or infiltrate
the system mostly through social engineering. In the recent
Keywords—Endpoint protection, Endpoint detection and past, many companies have been targeted this way. An
response, Endpoint protection platform, Data leakage, Privacy, example can be from Facebook, Sony, LinkedIn, and many
Insider threat, Data Breach more prominent companies.
I. INTRODUCTION There are several ways and tools to defend an
endpoint. In this paper, we will focus on two of them, namely,
Endpoint security or endpoint protection is an approach the endpoint protection platform (EPP) and endpoint detection
to protect the computer networks that are remotely bridged to and response (EDR). EPP is a platform that consists of
client devices [1]. Many electronic devices we use, such as different security tools such as antivirus, anti-malware, data
mobile phones, laptops, and tablets, are all endpoints. The encryption, personal firewalls, and intrusion prevention. EDR,
connection of laptops, tablets, mobile phones, and other with its specific function like continuous monitoring,
wireless devices to corporate networks creates attack paths for remediation, and no interference to the endpoint, has become
security threats [2]. No one wants to be disturbed or a popular way of detecting and responding accordingly when
eavesdropped when sending or receiving messages over the it comes to insider threat.
network. As a result, endpoint security has become a hot topic
for researchers in the cybersecurity area. In section I, the content of the article is briefly introduced.
In section II, the related work about insider threat is mentioned.
Laptops and mobile phones have become an essential part In section III, the essential features of the endpoint protection
of our modern life. The owner of an enterprise must figure out platform are introduced. In section IV, the drawbacks of
some features and standard methods of protecting the most endpoint protection platform are discussed. In section V,
vulnerable endpoints. A phishing link in an e-mail can give endpoint detection and response are presented. Disadvantages
access to company secrets to the hacker, and a third party of endpoint protection platform are mentioned as well. In
‘cloud’ service can quickly become the hacker’s target as well. section VI, effectiveness comparison between endpoint
protection platform and endpoint detection and response is
82
common system when defending the intrusion. sharply when it is under attack.
B. Protect the infected system B. The proportion of fileless attacks is on the rise
Detection certainly is an essential part of endpoint Viruses are mutable. Hackers will develop a new virus by
protection. However, no matter how prudent users are, transforming the existing features and changing the known
sometimes they still face a situation where viruses still infect signature to avoid detection from EPP. Creating a virus with a
the system or the network through the endpoint. Organizations unique signature is a child’s play now. Thanks to the nearly
must eliminate any possibility of any external invasion through automated virus construction kits that have filled the internet
endpoint to keep their system secure. Protection function aims over the past several years [20]. Ponemon’s Institute’s State of
to eliminate the virus that has already been inside the system Endpoint Security Risk Report for 2018 exposed that 54% of
as the source that may cause significant devastation to the organizations admitted becoming a victim of a successful
system. It is crucial because if the EPP system takes no action, fileless or file-based attacks. Of all the organizations
the viruses will infect the whole system. It supplies a solution compromised, 77% were attacked by the fileless techniques.
to remedy mistakes. EPP uses another algorithm for HIPS. The report also indicated that fileless attacks are ten times
HIPS must work with HIDS. However, a very significant more likely to succeed than traditional, file-based methods. [1]
difference between HIDS and HIPS is that HIPS will
Fileless attack techniques that exploit a fundamental gap in
annihilate threats that have been identified as a malicious
the traditional endpoint security are on the rise. Current
resource of HIDS. A HIPS has a mechanism of automatically
solutions are not able to stop them [21]. If HIDS cannot match
mitigating the detected risk [19].
the signature, the HIPS will not work, which in turn will cause
C. Whitelist and Blacklist the protection system to crash completely. HIDS typically runs
on the operating system. This means it can be easily
Whitelist/Blacklist function is another vital function that compromised by malicious insiders or malware [25]. Figure 2
EPP provides. “Blacklist and Whitelist” is treated as one of the shows that the frequency of fileless attack is growing more
significant solutions for endpoint security. EPP has its rapidly than ever [21].
database about viruses. It will automatically blacklist or block
software or files that are considered malicious. With the help
of whitelist, users can still get access to the software or data as
a whitelisted application or software is marked safe for the
system or network.
IV. WHY IS THE ENDPOINT PROTECTION PLATFORM NOT
FULL PROOF?
83
threats, and as a result, cannot eliminate it either. Such type of are listed in the following sub-section:
situations can lead to a massive loss for the company.
D. Insider threats can cause more damage than external
threats
Many different reasons can lead to data leakage. However,
the main reasons for information leakage can be divided into
two categories: accidental exposure and malicious exposure
[23].
x Accidental exposure: Accidental exposure sources from
negligent actions taken by the employees such as poor
password security, unauthorized download of infected
software and applications without the IT department’s
knowledge or permission [23]. A phishing e-mail is
another widespread factor that leads to the insider threat.
Most insider threat is the employee of a company. They
are manipulated by hackers to get the data they want. The Figure 3. Different data sources under hacker’s radar
insider threat is powerful than any external attack because
an employee can provide easy access to the company’s
system. The only solution is to educate and train the
employees and improve their awareness of data privacy
and security [6].
84
there are no residues of the virus. They can also repair the
damages caused by viruses to maintain the security of the
internal system.
D. Observe without interference
“No one wants to burden the endpoint with heavy client
software anymore: that was one of the antiviruses’ biggest
drawbacks.” [27]. As one of the security researchers from the
Office of Information Technology said, antivirus needs to be
installed in the user’s devices, which wastes many resources
of the endpoint. However, when it comes to EDR, it can just
execute in the kernel of the network with its endpoint detection
component. For example, a network manager can install EDR
in the company’s server instead of every device of the
employee. This will protect the entire internal network of the
organization.
Figure 7. The process of insider threat infecting the entire internal network E. Using machine learning to detect unknown threats
Machine learning is a subset of artificial intelligence in the
A. Threat intelligence
field of computer science that often uses statistical techniques
Threat intelligence, also known as Cyber Threat to give computers the ability to "learn" with data, without
Intelligence (CTI), is organized, analyzed, and refined being explicitly programmed [28]. By using machine learning,
information about potential or current attacks that threaten an EDR also becomes a “clever” platform, which is its another
organization [25]. Avoiding risk is much safer and more advantage compared to EPP. Predictive models use
reliable than putting the available data and network under risk sophisticated analytical techniques, such as deep learning, to
and then trying to fix it. EDR is not only a protection software, understand the characteristics of malware and “predict” the
but its threat intelligence function allows it to warn corporates likelihood of malware from unknown applications. This
about the potential risks and threats. It can provide some enables them to block never-before-seen attacks with a high
information about the threat, which is collected by the server degree of certainty [26]. Machine learning can improve the
of EDR. This kind of intelligence will facilitate the elimination ability to identify the threats that they have never encountered
of the insider threat by analyzing the information and data before. In such conditions where threats are mutable, this
about the insider threats that happened in the past rather than ability may become the most significant merits of EDR and the
predicting the latent risk. reason why most companies prefer to use it now.
B. Continuous monitoring F. Highly customizable
The only way to detect abnormal endpoint behavior is Another feature of the EDR product is that it can adjust
enhancing its control. If one endpoint is infected, EDR will itself to suit a company’s environment. Every company has its
detect the unusual activity of that particular endpoint unique distinguishing environment. Scanning from the root or
immediately and isolate it instantaneously. They can supervise a folder? Are essential files stored in disk C or D? Mitigating
endpoints dynamically, which means they shall test endpoint false positives? These functions require machine learning and
incessantly and automatically. Furthermore, it can supply CPU AI ability, which exactly are the most significant advantages
protection that can defend the kernel of the server. More of EDR. “Sophisticated endpoint protection providers can take
sophisticated behavior-based protection will include visibility the burden off of the admin by developing protection models
into activities at lower levels of the system, including CPU. that are automatically tailored for each organization by using
Visibility into CPU-level is active for blocking malware that machine learning to analyze the organization’s unique
attempts to manipulate and make changes in memory, software profile” [34].
including many exploits [26]. Powerful EDR tools enable easy
access to this data, providing immediate visibility to any area Through machine learning, EDR can filter a standard
of the organization. Consistent monitoring makes it impossible software from a malware, know which part it should focus on
for the threat from spreading through the endpoint [27]. when scanning, refine its’ effectiveness as time goes by, save
more resources than an unfit, unintelligent EDR production.
C. Remediation and cleanup Because of these advantages, EDR has become very popular
Once abnormal endpoints are cleaned up, the escalation of in many organizations. Many organizations are replacing EPP
the virus stops. One may think that the whole system is clean with EDR to protect their network system. However, EDR is
and safe. However, the presence of the advanced virus can act not a panacea. Some of EDR’s drawbacks still puzzle the
as an ink drop into pure water. It will diffuse to the other part companies. Very high false-positive rates and the requirement
to infect the internal network very fast. of highly trained operators are two of the most significant
flaws of EDR.
Moreover, every residue of that can generate virus again.
This is one of the biggest drawbacks of EPP as it cannot deal How to mitigate the high false-positive rates is a crucial
with the complete internal network but only a part of the feature to estimate the effectiveness of an EDR product. High
endpoint. EDR can scan all the internal networks to guarantee frequency of false positives will lower the productivity of an
organization. “Some endpoint protection models force a trade-
off between the strength of protection and false positives - they
85
take a heavy-handed approach that blocks malware but also is 99.3%, and the average false-positive rate is . With the
flags much legitimate software in the process” [30]. An EDR
production with strict protection mechanism can certainly help of these data, we can divide EPP into two states:
block most of the threats, but sometimes they will treat normal x Protection—EPP detects the threat and report
software as malware as well. In such situations, it will cause successfully.
much trouble, such as not allowing access to a normal file in x Compromise—EPP does not detect threats and allow
the way it is usually done. them to invade the system successfully.
EDR is an advanced technology to deal with cyber and Protection states could be further divided into two situations:
network threats. The more advanced it is, the more the
requirement for the operators who run it. The company would x True report—threats truly invade, EPP detects it and
need to hire a highly trained operator to control the entire EDR reports.
system, which ultimately increases the cost to the company. x False-positive—there is no actual threat invasion, but EPP
Surely, it is not a very big problem for a large company but mistakes it for threat invasion and reports.
some medium or small-sized companies it becomes a We assume R as the rate for EPP to get into protection states.
significant concern, as they must consider the increasing cost We know that R is 99.3% from statistical data collected by
concerning their information security. [31] AV-C company [33], so the formula could be represented as
Table.1 concludes the summary of the main features of EPP follows:
and EDR mentioned above. 2983
⎧
Table.1. Comparison between EPP and EDR ⎪ 3000
(99.3%)
17 (1)
EPP EDR ⎨
Unification of different Actively detect and eliminate ⎪ 3000
Rationale ⎩ (0.07%)
passive functions threats
Databases of virus’ Threat intelligence function
signature Supervise endpoints dynamically Because we have to take the performance of the computer
Repair the damage caused by a into account, we assume that
virus
Functions
HIDS and HIPS
Detection Function Running in x y is the lost productivity of one company
Network Kernel x is the work efficiency of one company.
Use machine learning to detect x is the time that is needed to eliminate the threat.
Blacklist & White list an unknown threat
x is the working hours.
Highly customizable
A matching signature High frequency of false positives
needs too many will lower the productivity of the According to an eight-hour workday system implemented
resources. organization by many companies, we assume is equal to eight hours.
Therefore, the formula of the true report is:
Detection of virus
Drawbacks signature is outdated y = 12.5% (2)
The requirement of highly
Cannot defend insider trained operators
threats Considering the states of EPP and according to equation (1),
multiplying the probability of protection by the probability of
Many functions
require internet true report, we can obtain the probability of true report as
99.3% ×
VI. WHICH IS BETTER: EPP OR EDR? Considering the false positives state. The formula for false
positive is:
After the fundamental conception of two products, we will y = 12.5% ( − ) (3)
propose a model to compare the effectiveness of both.
where is the time that cannot be put to work because of
A. The EPP Model false positives. According to the services of some EPP
First, we built a model for EPP. We know that EPP is a company, they need 1-2 working days to solve the false
passive defender and uses virus signature matching to detect positives. Therefore, it can be treated in 8-16 hours.
threats. Moreover, as we mentioned in section IV earlier, two Considering the state of EPP and according to equation (1),
disadvantages stand out: multiplying the probability of protection by the probability of
x It will reduce the efficiency of the system because it takes false positive. We can obtain the probability of false-positive
too many resources, which means it will lower the as 99.3% × .
productivity of a company
x Signature-based detection will lead to false positives When it comes to the worst situation, which is a
compromised situation:
According to the statistical data from AV-TEST company y= (4)
[32], we found that the average efficiency reduced by running
EPP is 12.5%. In addition, according to statistical data from Since the probability of protection is R, and EPP has only
AV-C company [33], we found that the average protection rate two states: protection and compromise, we get the probability
86
of compromise as 1-R, where R is 99.3%. Therefore, the rate finally get the average productivity loss as:
of compromise states happens at 0.07%.
y=R∙ ( ) (7)
Then we calculate the weighted average of all the three cases,
and finally get the average productivity loss, which is as While taking the actual state of most EDR products, we
follows: decide to change the domain of R to [0.5, 1]. As most EDR
y = 0.124 − 0.007 + 0.0007 (5) productions defense rate is higher than 95%, so, it means that
R should not be between 0 and 0.5. In our model, we assume
Using equation (5), we used Matlab to draw the trend ( ) = 1 − . Based on the above assumption, we get
map. In figure 8, we find that the intercept of Y-coordinate figure 9.
(loss) is 2, and the value of Y increases slightly with the
increase of X. The reason for the trend on this chart is that the
probability of compromise is very low. So, even if (time
that is needed to eliminate the threat) changes a lot, it will not
have such a big impact on the company's economic losses.
The reason why Y interception starts from 2 is that running
EPP will cause the system to run slowly, which will lead to a
decrease in productivity.
y= ( ) (6)
Then we calculate the weighted average of the two cases and Figure 10. The trend of EDR loss ( is 8h, and is 1)
87
C. Comparison of EPP and EDR some disadvantages of EPP as well, which includes
After obtaining the data and figures for EDR and EPP, we overutilization of resources, signature-based detection
combined them into one figure and compared their efficiency. methods, and requirement of the internet as a must to run many
functions. However, the most important and the most
In figure 11, we can see that there is an intersected
significant threat is that it cannot defend the insider threat.
boundary between EPP and EDR. Through solving the
When a virus infiltrates into the internal network, EPP is not
simultaneous equations of function (5) and function (7). We the right solution anymore.
got that the equation of boundary is as follows:
On the contrary, EDR can do what EPP cannot do. EDR is
0.8240 an expert in dealing with the insider threat. It can gather
= (8) different information; develop its intelligence to help detect
( ) − 0.0007
the abnormal endpoints to eliminate insider threats. It also
overcomes some disadvantages that EPP has, such as
occupying too many resources. However, it cannot do what
EPP can do too. A primary problem of EDR is that it cannot
prevent the endpoints from being infected. In other words, it
cannot handle external threats very well, and it cannot monitor
what happens to one specific endpoint. Prevention always goes
beyond remediation. In some difficult situations, when a virus
can infect an endpoint countless times, the EDR is not the right
solution at all.
In our proposed models, we find that the loss caused by
EPP will be the least, and the loss will not increase according
to the increase of threat severity. The reason is that the high
detection rate makes most threats unable to penetrate the
computer in depth. However, since EPP can reduce the speed
of system operation, once opened, it has to incur a small loss.
However, even so, these losses are perfectly acceptable
Figure 11. The combined trend of EPP and EDR loss ( is 8h, is 24h and compared to the enormous damages threatened by the
is 1, the red plane is EDR, and the blue plane is EPP) intrusion.
Therefore, at the left of this boundary, the blue plane is Secondly, in the EDR model, we noticed that EDR is the
above the red plane, which means that the loss in EPP is only product that may not lead to a loss but can completely
higher than the EDR. This is an exceptional situation that the defend against the threat. However, it all depends on the
success rate R, of EDR, is high, and the paralysis time caused efficiency of EDR products. There are a few cleaning
by threat is short. So, the best choice under such mechanisms. So, once the active prediction fails, threat
circumstances is EDR, and the prerequisite is: intrudes into the system, which will cause severe loss to the
whole system. So, we suggest that we should consider the pros
0.8240 and cons carefully when choosing EDR products.
< (9)
( ) − 0.0007 Thirdly, which one to choose between EPP and EDR?
From our final formula, we can see that the effectiveness
When it comes to the right of the boundary, the red plane is comparison between EPP and EDR involves two influencing
higher, and the best choice, in that case, is EPP. The factors, which are the time that is needed to eliminate the
prerequisite is: threat ( ) and the probability the EDR can actively predict
0.8240 (R). We suggest that priority should be given to the accuracy
> (10)
( ) − 0.0007 of active defense of EDR if its accuracy can approach 1, or the
time needed to clear the virus is very short, which will not
EDR, once compromised, will be paralyzed for a long time. cause significant loss to the enterprise, and the efficiency of
Therefore, the increase in the rate of this plane is significant. EDR will be higher than that of EPP. In other cases, EPP is
Once defense succeeds, it does not have to bear the cost of more efficient than EDR.
slowing down the system. Thus, the loss of productivity could However, to analyze the actual effectiveness of EPP and
be as low as zero. EPP is the opposite; it pays the price but EDR, we had to put many factors into consideration. The
runs stable, and it will not be influenced by threat dramatically. success rate of EDR is a crucial element to consider whether
to use this product or not. When the success rate is high, and
VII. CONCLUSION AND FUTURE WORK
the paralysis time caused by the risk is low, it is better to use
We have several methods to defend insider threat. However, EDR. However, if anything is different and either of the two
the most popular way that is being widely accepted is EPP and conditions is contrary, it is better to choose EPP. Most EDR
EDR. We found that they have different effects in different providers can guarantee high success detection and defense
situations. EPP is good at dealing with external threats. EPP probability, and the company must defend the threat. We
can effectively protect endpoints through its component strongly suggest that both products should be taken into
function such as HIDS, HIPS, and antiviruses. It can detect and consideration to ensure the safety and security of a company.
eliminate risks outside the system itself. There are certainly
88
In this paper, we introduced some concepts of EPP and EDR [16] Elisa Bertino, Gabriel Ghinita, “Towards mechanisms for detectio
and established a model for both of them, but there are many n and prevention of data exfiltration by insiders: keynote talk pa
per, “Proceedings of the 6th ACM Symposium on Information,
challenges and flaws that we could not address because of the Computer and Communications Security, Hong Kong, China,2011
limitations of the time, data and resources. However, as we , pp.10-19
know, threats and anti-threat methods are developing rapidly, [17] Techopedia, “Endpoint Protection Platform”, Available: https://ww
so the following needs to be done in the future: w.techopedia.com/definition/30918/endpoint-protection-platform-epp
x All the contents mentioned in this paper need to be [Accessed: March .11,2018]
updated and supplemented in time. [18] Liao, Hung Jen, et al. "Intrusion detection system: A comprehensive
review." Journal of Network & Computer Applications 36.1(2013):16-
x We also did some tests and data to verify the accuracy and 24.
deviation of our model. There are still many factors that
[19] Sean Wilkins, “A Guide to Choosing an Endpoint Protection Sol
should be taken into consideration in future tests. ution,” Available: http://www.tomsitpro.com/articles/endpoint-protec
x We can improve our model and help some scholars to tion-solutions,2-820.html [Accessed: March .11,2018]
strengthen their theory as well if some company can [20] David Strom, “7 trends in advanced endpoint protection”, Availa
release more data about their production. ble: https://www.networkworld.com/article/3089858/endpoint-protect
ion/7-trends-in-advanced-endpoint-protection.html [Accessed: March
REFERENCE .11,2018]
[21] Ponemon’s Institute. “The 2017 State of Endpoint Security Risk,” pp2,
[1] Margaret Rouse. “Endpoint security management”, Available: end
2017.
point security management [Accessed: September .16,2018]
[22] Margaret Rouse. “data loss prevention (DLP),” Available:
[2] TechTarget, “Endpoint security management.” Available: https://se
https://whatis.techtarget.com/definition/data-loss-prevention-DLP
archsecurity.techtarget.com/definition/endpoint-security-management
[Accessed: September .17,2018]
[Accessed: March .11,2018]
[23] “Accidental or malicious insider threat: staff awareness makes the
[3] The Barkly team, “Endpoint Protection for the Mid-Market:3 Trends
difference,” Available:
Driving Big Changes”, Available: https://blog.barkly.com/endpoint-
https://www.itgovernance.co.uk/blog/accidental-or-malicious-insider-
protection-trends-2018-mid-market [Accessed: July .15,2018]
threat-staff-awareness-makes-the-difference/ [Accessed: September
[4] Barkly. “Endpoint Protection was the #1 spending priority in 2018”, .16,2018]
pp1-2, 2018.
[24] CrowdStrike. “2018 Global Threat Report”, pp79, 2018.
[5] Cybersecurity insiders. “2018 Insider threat report”, Available: htt
[25] S. Chandel, M. Yan, S. Chen, H. Jiang and T. Ni, "Threat Intelligence
ps://www.cybersecurity-insiders.com/portfolio/insider-threat-report/ [
Sharing Community: A Countermeasure Against Advanced Persistent
Accessed: March .11,2018]
Threat," 2019 IEEE Conference on Multimedia Information Processing
[6] L. Xiangyu, L. Qiuyang, and S. Chandel, "Social Engineering and and Retrieval (MIPR), San Jose, CA, USA, 2019, pp. 353-359.Barkly.
Insider Threats," 2017 International Conference on Cyber-Enabled “Endpoint Protection Buyer’s Guide,” pp5-7, 2018.
Distributed Computing and Knowledge Discovery (CyberC), Nanjing,
[26] Lital Asher-Dothan, “Seven essential elements of modern endpoin
2017, pp. 25-34. Copyright © 2017, IEEE
t security,” Available: https://www.cybereason.com/blog/7-elements
[7] Zhang, Hongbin, et al. "An Active Defense Model and Framework of -of-modern-endpoint-security [Accessed: March .11,2018]
Insider Threats Detection and Sense." International Conference on
[27] Samuel, Arthur. "Some Studies in Machine Learning Using the Game
Information Assurance & Security IEEE Computer Society, 2009:258-
of Checkers." IBM Journal of Research and Development. 3 (3): 210–
261.
229.
[8] Due to C. Le, Sara Khanchi, A. Nur Zincir-Heywood, Malcolm
[28] Fortinet. “FORTIGUARD 2018 THREAT PREDICTIONS,” pp 4-7,
I. Heywood, "Benchmarking evolutionary computation approaches to
2017.
insider threat detection, “Proceedings of the Genetic and Evolutionary
Computation Conference, Kyoto, Japan,2018, pp.1286-1293 [29] Barkly, “Endpoint Protection Buyer’s Guide,” pp8-9, 2017
[9] Yuqing Sun, Ninghui Li, Elisa Bertino, “Proactive defense of insider [30] Arcticwolf. “Endpoint Detection & Response Is Not Enough”,
threats through authorization management, “Proceedings of 2011 Available: https://arcticwolf.com/resources/endpoint-detection-and-
international workshop on Ubiquitous affective awareness and response-is-not-enough/ [Accessed: September .25,2018]
intelligent interaction, Beijing, China,2011, pp.9-16 [31] AV-TEST, “AV-TEST Product Review and Certification Report
[10] William R. Claycomb, Dongwan Shin, “Detecting insider activity using – Sep-Oct/2018” Available: https://www.av-test.org/en/antivirus/bus
enhanced directory virtualization, “Proceedings of the 2010 ACM iness-windows-client/windows-10/october-2018/kaspersky-lab-endpoi
workshop on Insider threats, Chicago, Illinois, USA,2010, pp.29-36 nt-security-11.0-184137/ [Accessed: January.11,2019]
[11] Tabish Rashid, Ioannis Agrafiotis, Jason R.C. Nurse, “A New Take on [32] AV-C, “Real-World Protection Test July-November 2018”. Availa
Detecting Insider Threats: Exploring the Use of Hidden Markov ble: https://www.av-comparatives.org/tests/real-world-protection-test-
Models, “Proceedings of the 8th ACM CCS International Workshop on july-november-2018/ [Accessed: January.11,2019]
Managing Insider Security Threats, Vienna, Austria,2016, pp.47-56
[12] Tabish Rashid, Ioannis Agrafiotis, Jason R.C. Nurse, “A New Take on
Detecting Insider Threats: Exploring the Use of Hidden Markov
Models, “Proceedings of the 8th ACM CCS International Workshop on
Managing Insider Security Threats, Vienna, Austria,2016, pp.47-56
[13] Jonathan Voris, Jill Jermyn, Nathaniel Boggs, Salvatore Stolfo,
"Fox in the trap: thwarting masqueraders via automated decoy
document deployment, “Proceedings of the Eighth European Workshop
on System Security, Bordeaux, France,2015, Article No. 3
[14] Kenneth Brancik漓Gabriel Ghinita漓"The optimization of situation
al awareness for insider threat detection, "Proceedings of the Firs
t ACM Conference on Data and application security and privacy,
San Antonio, TX, USA,2011, pp.231-236
[15] Ameya Sanzgiri, Dipankar Dasgupta, "Classification of Insider
Threat Detection Techniques, “Proceedings of the 11th Annual Cyber
and Information Security Research Conference, Oak Ridge, TN,
USA,2016, Article No. 25
89