A Simulation-Based Approach to Development of a New Insider Threat Detection Technique: Active Indicators

被引:1
作者
Yerdon, Valarie A. [1 ]
Wohleber, Ryan W. [1 ]
Matthews, Gerald [1 ]
Reinerman-Jones, Lauren E. [1 ]
机构
[1] Univ Cent Florida, 4000 Cent Blvd, Orlando, FL 32816 USA
来源
ADVANCES IN HUMAN FACTORS IN CYBERSECURITY, AHFE 2018 | 2019年 / 782卷
关键词
Insider threat; Cyber security; Active Indicator Probes; Eye tracking;
D O I
10.1007/978-3-319-94782-2_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Current cybersecurity research on insider threats has focused on finding clues to illicit behavior, or "passive indicators", in existing data resources. However, a more proactive view of detection could preemptively uncover a potential threat, mitigating organizational damage. Active Indicator Probes (AIPs) of insider threats are stimuli placed into the workflow to trigger differential psychophysiological responses. This approach requires defining a library of AIPs and identifying eye tracking metrics to detect diagnostic responses. Since studying true insider threats is unrealistic and current research on deception uses controlled environments which may not generalize to the real world, it is crucial to utilize simulated environments to develop these new countermeasures. This study utilized a financial work environment simulation, where participants became employees reconstructing incomplete account information, under two conditions: permitted and illicit cyber tasking. Using eye tracking, reactions to AIPs placed in work environment were registered to find metrics for insider threat.
引用
收藏
页码:3 / 14
页数:12
相关论文
共 24 条
[1]  
[Anonymous], 2012, COMMON SENSE GUIDE M
[2]  
Beer W., 2012, GLOBAL EC CRIME SURV
[3]  
Bhuvaneswari P., 2015, International Journal of Engineering and Technology, V7, P109
[4]  
Derrick D.C., 2010, PROC HAWAII INT CONF
[5]   NONVERBAL LEAKAGE AND CLUES TO DECEPTION [J].
EKMAN, P ;
FRIESEN, WV .
PSYCHIATRY, 1969, 32 (01) :88-+
[6]  
Ekman Paul., 1981, ANN NEW YORK ACAD SC, V364, P269, DOI DOI 10.1111/J.1749-6632.1981.TB34479.X
[7]  
Emm D., 2015, It threat evolution in q2 2015
[8]  
Greitzer F.L., 2016, STIDS, P19
[9]  
Hashem Y., 2015, P 7 ACM CCS INT WORK, P71, DOI 10.1145/2808783.2808792
[10]  
Leschnitzer D, 2013, CYBER SECURITY LECT