Skip to main content

An Insider Threat Factors and Features Categorization for Manufacturing Execution System

  • Conference paper
  • First Online:
Advances in Electronics Engineering

Abstract

An insider threats turn cyber world into insecure data breaches and system compromised as the insider having legitimate access to information of critical assets. Furthermore, the threat reflected unnoticeable and none able to foresee what, when and how literally the trusted insiders who has authority launched the threats against an organization. Due to this, there is lack of theoretical view discussion by the research community that can be used as a reference to categorize factors, specifically features that can contribute to the insider threats in manufacturing execution systems (MES). Therefore, a theoretical view to categorize factors and features which represent the behavior of insider threats in MES is proposed based on conducted literature survey. These threats could be grouped into three major factors i.e. human, systems and machine as stressed, and consequently a possible feature that can be a contributor for every single factor identified based on previous researcher recommendations. For the purpose of facilitate the understanding, the real scenario from the automation execution system from manufacturing sector is chosen as case study. Each factor and every single related feature identified, grouped and fact been highlighted. Hence, a theoretical framework for MES could be derived and facilitate as a standard guideline to mitigate insider threats in manufacturing field.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alhanahnah MJ, Jhumka A, Alouneh S (2016) A multidimension taxonomy of insider threats in cloud computing. Comput J 59(11):1612–1622. https://doi.org/10.1093/comjnl/bxw020

    Article  Google Scholar 

  2. Brock B (2017) Detecting insider threats using radish: a system for real-time anomaly detection in heterogeneous data streams, pp 1–12

    Google Scholar 

  3. Elmrabit N, Yang S-H, Yang L (2015) Insider threats in information security categories and approaches. In 2015 21st International Conference on automation and computing (ICAC). IEEE, (ed), p pp 1–6. https://doi.org/10.1109/IConAC.2015.7313979

  4. Greitzer FL et al (2012) Identifying at-risk employees: modeling psychosocial precursors of potential insider threats. In 2012 47 th Hawaii International conference on system sciences. IEEE, pp 2392–2401. https://doi.org/10.1109/HICSS.2012.309

  5. Greitzer FL et al (2014) Unintentional insider threat: contributing factors, observables, and mitigation strategies, In 2014 47th Hawaii International Conference on System Sciences. IEEE, pp 2025–2034. https://doi.org/10.1109/HICSS.2014.256

  6. Homoliak I et al (2018) Insight into insiders: a survey of insider threat taxonomies, analysis, modeling, and countermeasures

    Google Scholar 

  7. Homoliak I et al (2019) Insight into insiders and IT, ACM Comput Surv 52(2):1–40. https://doi.org/10.1145/3303771

    Article  Google Scholar 

  8. Legg PA et al (2015) Caught in the act of an insider attack: detection and assessment of insider threat. In 2015 IEEE International Symposium on Technologies for Homeland Security (HST). IEEE, pp 1–6. https://doi.org/10.1109/THS.2015.7446229

  9. Maasberg M, Warren J, Beebe NL (2015) The dark side of the insider: detecting the insider threat through examination of dark triad personality traits. In 2015 48th Hawaii International Conference on System Sciences. IEEE, pp 3518–3526. https://doi.org/10.1109/HICSS.2015.423

  10. Magana J et al (2017) Are proximity attacks a threat to the security of split manufacturing of integrated circuits? IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 25(12), pp 3406–3419. https://doi.org/10.1109/TVLSI.2017.2748018

    Article  Google Scholar 

  11. May CR et al (2017) Insight into insiders: a survey of insider threat taxonomies, analysis, modeling, and countermeasures

    Google Scholar 

  12. Moore AP et al (2011) A preliminary model of insider theft of intellectual property. JoWUA, 2(1), pp 28–49. https://doi.org/10.22667/JOWUA.2011.03.31.028

  13. Nasr PM, Varjani AY (2014) Alarm based anomaly detection of insider attacks in SCADA system. In 2014 Smart Grid Conference (SGC). IEEE, pp 1–6. https://doi.org/10.1109/SGC.2014.7090881

  14. Ntalampiras S, Soupionis Y, Giannopoulos G (2015) A fault diagnosis system for interdependent critical infrastructures based on HMMs. Reliability Engineering & System Safety, 138, pp 73–81. https://doi.org/10.1016/j.ress.2015.01.024

    Article  Google Scholar 

  15. Permissions F (2016) A multidimension taxonomy of insider threats in cloud computing

    Google Scholar 

  16. Soupionis Y, Ntalampiras S, Giannopoulos G (2016) Faults and cyber attacks detection in critical infrastructures, pp 283–289. https://doi.org/10.1007/978-3-319-31664-2_29

    Chapter  Google Scholar 

  17. Wang Y et al (2016) Front-end-of-line attacks in split manufacturing

    Google Scholar 

  18. Zargar A, Nowroozi A, Jalili R (2016) XABA: a zero-knowledge anomaly-based behavioral analysis method to detect insider threats. In 2016 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC). IEEE, pp 26–31. https://doi.org/10.1109/ISCISC.2016.7736447

  19. Zhu B, Sastry S (2010) SCADA-specific intrusion detection/prevention systems: a survey an taxonomy, pp 1–16

    Google Scholar 

  20. Zou, B. et al. (2018) Insider threats of physical protection systems in nuclear power plants: prevention and evaluation. Progress in Nuclear Energy 104, pp 8–15. https://doi.org/10.1016/j.pnucene.2017.08.006

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Warusia Mohamed Yassin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yassin, W.M., Ahmad, R., Mohammad, N.A.N. (2020). An Insider Threat Factors and Features Categorization for Manufacturing Execution System. In: Zakaria, Z., Ahmad, R. (eds) Advances in Electronics Engineering. Lecture Notes in Electrical Engineering, vol 619. Springer, Singapore. https://doi.org/10.1007/978-981-15-1289-6_30

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-1289-6_30

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-1288-9

  • Online ISBN: 978-981-15-1289-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics