Modeling of Insider Threat using Enterprise Automaton

被引:0
作者
Roy, Puloma [1 ]
Mazumdar, Chandan [1 ]
机构
[1] Jadavpur Univ, Ctr Distributed Comp, Kolkata, India
来源
PROCEEDINGS OF 2018 FIFTH INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT) | 2018年
关键词
Enterprise process; Insider; Insider Threat; Insider Attacker;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Substantial portions of attacks on the security of enterprises are perpetrated by Insiders having authorized privileges. Thus insider threat and attack detection is an important aspect of Security management. In the published literature, efforts are on to model the insider threats based on the behavioral traits of employees. The psycho-social behaviors are hard to encode in the software systems. Also, in some cases, there are privacy issues involved. In this paper, the human and non-human agents in a system are described in a novel unified model. The enterprise is described as an automaton and its states are classified secure, safe, unsafe and compromised. The insider agents and threats are modeled on the basis of the automaton and the model is validated using a case study.
引用
收藏
页数:4
相关论文
共 50 条
  • [11] An agent-based approach to modeling insider threat
    John A. Sokolowski
    Catherine M. Banks
    Thomas J. Dover
    Computational and Mathematical Organization Theory, 2016, 22 : 273 - 287
  • [12] Introduction to the special issue on insider threat modeling and simulation
    Andrew P. Moore
    Kirk A. Kennedy
    Thomas J. Dover
    Computational and Mathematical Organization Theory, 2016, 22 : 261 - 272
  • [13] Modelling of Enterprise Insider Threats
    Roy, Puloma
    Mazumdar, Chandan
    2015 INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2015, : 132 - 136
  • [14] Insider Threat Detection Using Machine Learning Approach
    Sarhan, Bushra Bin
    Altwaijry, Najwa
    APPLIED SCIENCES-BASEL, 2023, 13 (01):
  • [15] Survival analysis for insider threatDetecting insider threat incidents using survival analysis techniques
    Elie Alhajjar
    Taylor Bradley
    Computational and Mathematical Organization Theory, 2022, 28 : 335 - 351
  • [16] Insight Into Insiders and IT: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures
    Homoliak, Ivan
    Toffalini, Flavio
    Guarnizo, Juan
    Elovici, Yuval
    Ochoa, Martin
    ACM COMPUTING SURVEYS, 2019, 52 (02)
  • [17] Full-featured information equalization modeling for insider threat detection
    Liu Y.
    Luo S.-L.
    Qu L.-W.
    Pan L.-M.
    Zhang J.
    Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2019, 53 (04): : 777 - 784
  • [18] Modeling Worm Propagation and Insider Threat in Air-Gapped Network using Modified SEIQV Model
    Safar, Jamie L.
    Tummala, Murali
    McEachen, John C.
    Bollmann, Chad
    2019 13TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS), 2019,
  • [19] Insider threat detection for specific threat scenarios
    Tian, Tian
    Zhang, Chen
    Jiang, Bo
    Feng, Huamin
    Lu, Zhigang
    CYBERSECURITY, 2025, 8 (01):
  • [20] Intelligence Analyses and the Insider Threat
    Santos, Eugene, Jr.
    Hien Nguyen
    Yu, Fei
    Kim, Keum Joo
    Li, Deqing
    Wilkinson, John T.
    Olson, Adam
    Russell, Jacob
    Clark, Brittany
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2012, 42 (02): : 331 - 347