Modeling of Insider Threat using Enterprise Automaton

被引:0
作者
Roy, Puloma [1 ]
Mazumdar, Chandan [1 ]
机构
[1] Jadavpur Univ, Ctr Distributed Comp, Kolkata, India
来源
PROCEEDINGS OF 2018 FIFTH INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT) | 2018年
关键词
Enterprise process; Insider; Insider Threat; Insider Attacker;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Substantial portions of attacks on the security of enterprises are perpetrated by Insiders having authorized privileges. Thus insider threat and attack detection is an important aspect of Security management. In the published literature, efforts are on to model the insider threats based on the behavioral traits of employees. The psycho-social behaviors are hard to encode in the software systems. Also, in some cases, there are privacy issues involved. In this paper, the human and non-human agents in a system are described in a novel unified model. The enterprise is described as an automaton and its states are classified secure, safe, unsafe and compromised. The insider agents and threats are modeled on the basis of the automaton and the model is validated using a case study.
引用
收藏
页数:4
相关论文
共 50 条
[11]   Introduction to the special issue on insider threat modeling and simulation [J].
Andrew P. Moore ;
Kirk A. Kennedy ;
Thomas J. Dover .
Computational and Mathematical Organization Theory, 2016, 22 :261-272
[12]   An agent-based approach to modeling insider threat [J].
John A. Sokolowski ;
Catherine M. Banks ;
Thomas J. Dover .
Computational and Mathematical Organization Theory, 2016, 22 :273-287
[13]   Modelling of Enterprise Insider Threats [J].
Roy, Puloma ;
Mazumdar, Chandan .
2015 INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2015, :132-136
[14]   Insider Threat Detection Using Machine Learning Approach [J].
Sarhan, Bushra Bin ;
Altwaijry, Najwa .
APPLIED SCIENCES-BASEL, 2023, 13 (01)
[15]   Survival analysis for insider threatDetecting insider threat incidents using survival analysis techniques [J].
Elie Alhajjar ;
Taylor Bradley .
Computational and Mathematical Organization Theory, 2022, 28 :335-351
[16]   Insight Into Insiders and IT: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures [J].
Homoliak, Ivan ;
Toffalini, Flavio ;
Guarnizo, Juan ;
Elovici, Yuval ;
Ochoa, Martin .
ACM COMPUTING SURVEYS, 2019, 52 (02)
[17]   Full-featured information equalization modeling for insider threat detection [J].
Liu Y. ;
Luo S.-L. ;
Qu L.-W. ;
Pan L.-M. ;
Zhang J. .
Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2019, 53 (04) :777-784
[18]   Modeling Worm Propagation and Insider Threat in Air-Gapped Network using Modified SEIQV Model [J].
Safar, Jamie L. ;
Tummala, Murali ;
McEachen, John C. ;
Bollmann, Chad .
2019 13TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS), 2019,
[19]   Insider threat detection for specific threat scenarios [J].
Tian, Tian ;
Zhang, Chen ;
Jiang, Bo ;
Feng, Huamin ;
Lu, Zhigang .
CYBERSECURITY, 2025, 8 (01)
[20]   Understanding Insider Threat Attacks Using Natural Language Processing: Automatically Mapping Organic Narrative Reports to Existing Insider Threat Frameworks [J].
Paxton-Fear, Katie ;
Hodges, Duncan ;
Buckley, Oliver .
HCI FOR CYBERSECURITY, PRIVACY AND TRUST, HCI-CPT 2020, 2020, 12210 :619-636