Modeling Insider Threat Types in Cyber Organizations

被引:0
作者
Santos, Eunice E. [1 ]
Santos, Eugene, Jr. [2 ]
Korah, John [1 ]
Thompson, Jeremy E. [2 ]
Murugappan, Vairavan [1 ]
Subramanian, Suresh [1 ]
Zhao, Yan [2 ]
机构
[1] IIT, Dept Comp Sci, Chicago, IL 60616 USA
[2] Dartmouth Coll, Thayer Sch Engn, Hanover, NH 03755 USA
来源
2017 IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST) | 2017年
关键词
Bayesian knowledge bases (BKBs); insider threat; computational modeling; behavioral modeling; social modeling; trust; manipulation; cyber security;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Insider threats can cause immense damage to organizations of different types, including government, corporate, and non-profit organizations. Being an insider, however, does not necessarily equate to being a threat. Effectively identifying valid threats, and assessing the type of threat an insider presents, remain difficult challenges. In this work, we propose a novel breakdown of eight insider threat types, identified by using three insider traits: predictability, susceptibility, and awareness. In addition to presenting this framework for insider threat types, we implement a computational model to demonstrate the viability of our framework with synthetic scenarios devised after reviewing real world insider threat case studies. The results yield useful insights into how further investigation might proceed to reveal how best to gauge predictability, susceptibility, and awareness, and precisely how they relate to the eight insider types.
引用
收藏
页数:7
相关论文
共 50 条
  • [41] A new intelligent multilayer framework for insider threat detection
    Al-Mhiqani, Mohammed Nasser
    Ahmad, Rabiah
    Abidin, Z. Zainal
    Abdulkareem, Karrar Hameed
    Mohammed, Mazin Abed
    Gupta, Deepak
    Shankar, K.
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2022, 97
  • [42] Machine learning based Insider Threat Modelling and Detection
    Le, Duc C.
    Zincir-Heywood, A. Nur
    [J]. 2019 IFIP/IEEE SYMPOSIUM ON INTEGRATED NETWORK AND SERVICE MANAGEMENT (IM), 2019,
  • [43] Cyber security in smart agriculture: Threat types, current status, and future trends
    Alahe, Mohammad Ashik
    Wei, Lin
    Chang, Young
    Gummi, Sainath Reddy
    Kemeshi, James
    Yang, Xufei
    Won, Kwanghee
    Sher, Mazhar
    [J]. COMPUTERS AND ELECTRONICS IN AGRICULTURE, 2024, 226
  • [44] STRIDE-based Threat Modeling for Cyber-Physical Systems
    Khan, Rafiullah
    McLaughlin, Kieran
    Laverty, David
    Sezer, Sakir
    [J]. 2017 IEEE PES INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE EUROPE (ISGT-EUROPE), 2017,
  • [45] Security Threat Modeling for Power Transformers Cyber-Physical Environments
    Ahn, BoHyun
    Kim, Taesic
    Smith, Scott C.
    Youn, Young-Woo
    Ryu, Myung-Hyo
    [J]. 2021 IEEE POWER & ENERGY SOCIETY INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE (ISGT), 2021,
  • [46] Cyber Security Threat Analysis and Modeling of an Unmanned Aerial Vehicle System
    Javaid, Ahmad Y.
    Sun, Weiqing
    Devabhaktuni, Vijay K.
    Alam, Mansoor
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY, 2012, : 585 - 590
  • [47] Situational awareness ontology modeling for threat from space cyber operations
    Liu B.
    Yi J.
    Yao L.
    Wang Y.
    Ding Z.
    Zhu X.
    [J]. Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2023, 45 (03): : 745 - 754
  • [48] Mathematical Modeling and Clustering Framework for Cyber Threat Analysis Across Industries
    Sufi, Fahim
    Alsulami, Musleh
    [J]. MATHEMATICS, 2025, 13 (04)
  • [49] Contrastive Learning for Insider Threat Detection
    Vinay, M. S.
    Yuan, Shuhan
    Wu, Xintao
    [J]. DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, DASFAA 2022, PT I, 2022, : 395 - 403
  • [50] Cybercrime Countermeasure of Insider Threat Investigation
    Kao, Da-Yu
    [J]. 2019 21ST INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ICT FOR 4TH INDUSTRIAL REVOLUTION, 2019, : 413 - 418