Modeling Insider Threat Types in Cyber Organizations

被引:0
|
作者
Santos, Eunice E. [1 ]
Santos, Eugene, Jr. [2 ]
Korah, John [1 ]
Thompson, Jeremy E. [2 ]
Murugappan, Vairavan [1 ]
Subramanian, Suresh [1 ]
Zhao, Yan [2 ]
机构
[1] IIT, Dept Comp Sci, Chicago, IL 60616 USA
[2] Dartmouth Coll, Thayer Sch Engn, Hanover, NH 03755 USA
来源
2017 IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST) | 2017年
关键词
Bayesian knowledge bases (BKBs); insider threat; computational modeling; behavioral modeling; social modeling; trust; manipulation; cyber security;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Insider threats can cause immense damage to organizations of different types, including government, corporate, and non-profit organizations. Being an insider, however, does not necessarily equate to being a threat. Effectively identifying valid threats, and assessing the type of threat an insider presents, remain difficult challenges. In this work, we propose a novel breakdown of eight insider threat types, identified by using three insider traits: predictability, susceptibility, and awareness. In addition to presenting this framework for insider threat types, we implement a computational model to demonstrate the viability of our framework with synthetic scenarios devised after reviewing real world insider threat case studies. The results yield useful insights into how further investigation might proceed to reveal how best to gauge predictability, susceptibility, and awareness, and precisely how they relate to the eight insider types.
引用
收藏
页数:7
相关论文
共 50 条
  • [21] The Dynamic Nature of Insider Threat Indicators
    Frank L. Greitzer
    Justin Purl
    SN Computer Science, 2022, 3 (2)
  • [22] Machine Learning for Insider Threat Detection
    Naicker, Tristan Sashlen
    van Niekerk, Brett
    PROCEEDINGS OF THE 3RD EUROPEAN CONFERENCE ON THE IMPACT OF ARTIFICIAL INTELLIGENCE AND ROBOTICS (ECIAIR 2021), 2021, : 122 - 131
  • [23] Developing a conceptual model for insider threat
    Whitty, Monica T.
    JOURNAL OF MANAGEMENT & ORGANIZATION, 2021, 27 (05) : 911 - 929
  • [24] Integrating Cyber Deception Into Attribute-Based Access Control (ABAC) for Insider Threat Detection
    Alohaly, Manar
    Balogun, Olusesi
    Takabi, Daniel
    IEEE ACCESS, 2022, 10 : 108965 - 108978
  • [25] Physics-Based Attack Detection for an Insider Threat Model in a Cyber-Physical System
    Agrawal, Anand
    Ahmed, Chuadhry Mujeeb
    Chang, Ee-Chien
    PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, : 821 - 823
  • [26] Insight Into Insiders and IT: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures
    Homoliak, Ivan
    Toffalini, Flavio
    Guarnizo, Juan
    Elovici, Yuval
    Ochoa, Martin
    ACM COMPUTING SURVEYS, 2019, 52 (02)
  • [27] Full-featured information equalization modeling for insider threat detection
    Liu Y.
    Luo S.-L.
    Qu L.-W.
    Pan L.-M.
    Zhang J.
    Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2019, 53 (04): : 777 - 784
  • [28] Insider threat detection for specific threat scenarios
    Tian, Tian
    Zhang, Chen
    Jiang, Bo
    Feng, Huamin
    Lu, Zhigang
    CYBERSECURITY, 2025, 8 (01):
  • [29] Insider Threat Cybersecurity Framework Webtool & Methodology: Defending Against Complex Cyber-Physical Threats
    Mylrea, Michael
    Gourisetti, Sri Nikhil Gupta
    Larimer, Curtis
    Noonan, Christine
    2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, : 207 - 216
  • [30] Intelligence Analyses and the Insider Threat
    Santos, Eugene, Jr.
    Hien Nguyen
    Yu, Fei
    Kim, Keum Joo
    Li, Deqing
    Wilkinson, John T.
    Olson, Adam
    Russell, Jacob
    Clark, Brittany
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2012, 42 (02): : 331 - 347