Next Article in Journal
Prediction of End-Of-Season Tuber Yield and Tuber Set in Potatoes Using In-Season UAV-Based Hyperspectral Imagery and Machine Learning
Previous Article in Journal
A Heterogeneous Edge-Fog Environment Supporting Digital Twins for Remote Inspections
Open AccessArticle

Tracking the Insider Attacker: A Blockchain Traceability System for Insider Threats

1
Institute for Cyber Security, School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China
2
Institute of Computer Application, China Academy of Engineering Physics, Mianyang 621900, China
3
School of CyberScience, University of Science and Technology of China, Hefei 230027, China
*
Author to whom correspondence should be addressed.
Sensors 2020, 20(18), 5297; https://doi.org/10.3390/s20185297
Received: 16 August 2020 / Revised: 11 September 2020 / Accepted: 13 September 2020 / Published: 16 September 2020
(This article belongs to the Section Intelligent Sensors)
The insider threats have always been one of the most severe challenges to cybersecurity. It can lead to the destruction of the organisation’s internal network system and information leakage, which seriously threaten the confidentiality, integrity and availability of data. To make matters worse, since the attacker has authorized access to the internal network, they can launch the attack from the inside and erase their attack trace, which makes it challenging to track and forensics. A blockchain traceability system for insider threats is proposed in this paper to mitigate the issue. First, this paper constructs an insider threat model of the internal network from a different perspective: insider attack forensics and prevent insider attacker from escaping. Then, we analyze why it is difficult to track attackers and obtain evidence when an insider threat has occurred. After that, the blockchain traceability system is designed in terms of data structure, transaction structure, block structure, consensus algorithm, data storage algorithm, and query algorithm, while using differential privacy to protect user privacy. We deployed this blockchain traceability system and conducted experiments, and the results show that it can achieve the goal of mitigating insider threats. View Full-Text
Keywords: blockchain; insider threat; traceability system; differential privacy blockchain; insider threat; traceability system; differential privacy
Show Figures

Figure 1

MDPI and ACS Style

Hu, T.; Xin, B.; Liu, X.; Chen, T.; Ding, K.; Zhang, X. Tracking the Insider Attacker: A Blockchain Traceability System for Insider Threats. Sensors 2020, 20, 5297.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Search more from Scilit
 
Search
Back to TopTop