Modeling Insider Threat Types in Cyber Organizations

被引:0
|
作者
Santos, Eunice E. [1 ]
Santos, Eugene, Jr. [2 ]
Korah, John [1 ]
Thompson, Jeremy E. [2 ]
Murugappan, Vairavan [1 ]
Subramanian, Suresh [1 ]
Zhao, Yan [2 ]
机构
[1] IIT, Dept Comp Sci, Chicago, IL 60616 USA
[2] Dartmouth Coll, Thayer Sch Engn, Hanover, NH 03755 USA
来源
2017 IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST) | 2017年
关键词
Bayesian knowledge bases (BKBs); insider threat; computational modeling; behavioral modeling; social modeling; trust; manipulation; cyber security;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Insider threats can cause immense damage to organizations of different types, including government, corporate, and non-profit organizations. Being an insider, however, does not necessarily equate to being a threat. Effectively identifying valid threats, and assessing the type of threat an insider presents, remain difficult challenges. In this work, we propose a novel breakdown of eight insider threat types, identified by using three insider traits: predictability, susceptibility, and awareness. In addition to presenting this framework for insider threat types, we implement a computational model to demonstrate the viability of our framework with synthetic scenarios devised after reviewing real world insider threat case studies. The results yield useful insights into how further investigation might proceed to reveal how best to gauge predictability, susceptibility, and awareness, and precisely how they relate to the eight insider types.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] The Trend of the Security Research for the Insider Cyber Threat
    Hong, Jaeseung
    Kim, Jongwung
    Cho, Jeonghun
    SECURITY TECHNOLOGY, PROCEEDINGS, 2009, 58 : 100 - 107
  • [2] The Trend of the Security Research for the Insider Cyber Threat
    Hong, Jaeseung
    Kim, Jongwung
    Cho, Jeonghun
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2010, 3 (02): : 31 - 40
  • [3] The Trend of the Security Research for the Insider Cyber Threat
    Hong, Jaeseung
    Kim, Jongwung
    Cho, Jeonghun
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2010, 4 (03): : 55 - 63
  • [4] CYBER THREAT MODELING FRAMEWORK
    Raposo de Melo, Renato Carvalho
    Albuquerque, Robson de Oliveira
    Lopes de Mendonca, Fabio Lficio
    2022 17TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2022,
  • [5] Probabilistic Modeling of Insider Threat Detection Systems
    Ruttenberg, Brian
    Blumstein, Dave
    Druce, Jeff
    Howard, Michael
    Reed, Fred
    Wilfong, Leslie
    Lister, Crystal
    Gaskin, Steve
    Foley, Meaghan
    Scofield, Dan
    GRAPHICAL MODELS FOR SECURITY, 2018, 10744 : 91 - 98
  • [6] Modeling of Insider Threat using Enterprise Automaton
    Roy, Puloma
    Mazumdar, Chandan
    PROCEEDINGS OF 2018 FIFTH INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2018,
  • [7] Detecting Insider Threat via a Cyber-Security Culture Framework
    Georgiadou, Anna
    Mouzakitis, Spiros
    Askounis, Dimitris
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2022, 62 (04) : 706 - 716
  • [8] Scenario-Based Insider Threat Detection From Cyber Activities
    Chattopadhyay, Pratik
    Wang, Lipo
    Tan, Yap-Peng
    IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2018, 5 (03): : 660 - 675
  • [9] An Artificial Neural Network Autoencoder for Insider Cyber Security Threat Detection
    Saminathan, Karthikeyan
    Mulka, Sai Tharun Reddy
    Damodharan, Sangeetha
    Maheswar, Rajagopal
    Lorincz, Josip
    FUTURE INTERNET, 2023, 15 (12)
  • [10] A Statistical Analysis Framework for Detecting Insider Threat Activities on Cyber Systems
    Findley, Scott
    Singh, Gurminder
    Shaffer, Alan
    2019 6TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI 2019), 2019, : 1 - 6