Modeling of Insider Threat using Enterprise Automaton

被引:0
作者
Roy, Puloma [1 ]
Mazumdar, Chandan [1 ]
机构
[1] Jadavpur Univ, Ctr Distributed Comp, Kolkata, India
来源
PROCEEDINGS OF 2018 FIFTH INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT) | 2018年
关键词
Enterprise process; Insider; Insider Threat; Insider Attacker;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Substantial portions of attacks on the security of enterprises are perpetrated by Insiders having authorized privileges. Thus insider threat and attack detection is an important aspect of Security management. In the published literature, efforts are on to model the insider threats based on the behavioral traits of employees. The psycho-social behaviors are hard to encode in the software systems. Also, in some cases, there are privacy issues involved. In this paper, the human and non-human agents in a system are described in a novel unified model. The enterprise is described as an automaton and its states are classified secure, safe, unsafe and compromised. The insider agents and threats are modeled on the basis of the automaton and the model is validated using a case study.
引用
收藏
页数:4
相关论文
共 50 条
  • [21] Insider Threat Data Expansion Research using Hyperledger Fabric
    Yoon, Wonseok
    Chang, HangBae
    [J]. 2022 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON22), 2022, : 25 - 28
  • [22] Using dynamic models to support inferences of insider threat risk
    Paul J. Sticha
    Elise T. Axelrad
    [J]. Computational and Mathematical Organization Theory, 2016, 22 : 350 - 381
  • [23] Insider Threat Detection Using a Graph-Based Approach
    Eberle, William
    Graves, Jeffrey
    Holder, Lawrence
    [J]. JOURNAL OF APPLIED SECURITY RESEARCH, 2010, 6 (01) : 32 - 81
  • [24] Insider threat detection using supervised machine learning algorithms
    Manoharan, Phavithra
    Yin, Jiao
    Wang, Hua
    Zhang, Yanchun
    Ye, Wenjie
    [J]. TELECOMMUNICATION SYSTEMS, 2024, 87 (04) : 899 - 915
  • [25] The Insider Threat in Cloud Computing
    Kandias, Miltiadis
    Virvilis, Nikos
    Gritzalis, Dimitris
    [J]. CRITICAL INFORMATION INFRASTRUCTURE SECURITY, CRITIS 2011, 2013, 6983 : 93 - 103
  • [26] Intelligence Analyses and the Insider Threat
    Santos, Eugene, Jr.
    Hien Nguyen
    Yu, Fei
    Kim, Keum Joo
    Li, Deqing
    Wilkinson, John T.
    Olson, Adam
    Russell, Jacob
    Clark, Brittany
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2012, 42 (02): : 331 - 347
  • [27] A study on Classification of Insider threat using Markov Chain Model
    Kim, Dong-Wook
    Hong, Sung-Sam
    Han, Myung-Mook
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (04): : 1887 - 1898
  • [28] An Insider Threat Prediction Model
    Kandias, Miltiadis
    Mylonas, Alexios
    Virvilis, Nikos
    Theoharidou, Marianthi
    Gritzalis, Dimitris
    [J]. TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2010, 6264 : 26 - 37
  • [29] Addressing the Insider Threat Introduction
    Pfleeger, Shari Lawrence
    Stolfo, Salvatore J.
    [J]. IEEE SECURITY & PRIVACY, 2009, 7 (06) : 10 - 13
  • [30] Behavioral Based Insider Threat Detection Using Deep Learning
    Nasir, Rida
    Afzal, Mehreen
    Latif, Rabia
    Iqbal, Waseem
    [J]. IEEE ACCESS, 2021, 9 : 143266 - 143274