Modeling of Insider Threat using Enterprise Automaton

被引:0
作者
Roy, Puloma [1 ]
Mazumdar, Chandan [1 ]
机构
[1] Jadavpur Univ, Ctr Distributed Comp, Kolkata, India
来源
PROCEEDINGS OF 2018 FIFTH INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT) | 2018年
关键词
Enterprise process; Insider; Insider Threat; Insider Attacker;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Substantial portions of attacks on the security of enterprises are perpetrated by Insiders having authorized privileges. Thus insider threat and attack detection is an important aspect of Security management. In the published literature, efforts are on to model the insider threats based on the behavioral traits of employees. The psycho-social behaviors are hard to encode in the software systems. Also, in some cases, there are privacy issues involved. In this paper, the human and non-human agents in a system are described in a novel unified model. The enterprise is described as an automaton and its states are classified secure, safe, unsafe and compromised. The insider agents and threats are modeled on the basis of the automaton and the model is validated using a case study.
引用
收藏
页数:4
相关论文
共 50 条
[21]   Insider Threat Detection using an Artificial Immune system Algorithm [J].
Igbe, Obinna ;
Saadawi, Tarek .
2018 9TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2018, :297-302
[22]   Insider Threat Detection Using a Graph-Based Approach [J].
Eberle, William ;
Graves, Jeffrey ;
Holder, Lawrence .
JOURNAL OF APPLIED SECURITY RESEARCH, 2010, 6 (01) :32-81
[23]   Insider Threat Data Expansion Research using Hyperledger Fabric [J].
Yoon, Wonseok ;
Chang, HangBae .
2022 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON22), 2022, :25-28
[24]   Using dynamic models to support inferences of insider threat risk [J].
Paul J. Sticha ;
Elise T. Axelrad .
Computational and Mathematical Organization Theory, 2016, 22 :350-381
[25]   The Insider Threat in Cloud Computing [J].
Kandias, Miltiadis ;
Virvilis, Nikos ;
Gritzalis, Dimitris .
CRITICAL INFORMATION INFRASTRUCTURE SECURITY, CRITIS 2011, 2013, 6983 :93-103
[26]   Insider threat detection using supervised machine learning algorithms [J].
Manoharan, Phavithra ;
Yin, Jiao ;
Wang, Hua ;
Zhang, Yanchun ;
Ye, Wenjie .
TELECOMMUNICATION SYSTEMS, 2024, 87 (04) :899-915
[27]   Intelligence Analyses and the Insider Threat [J].
Santos, Eugene, Jr. ;
Hien Nguyen ;
Yu, Fei ;
Kim, Keum Joo ;
Li, Deqing ;
Wilkinson, John T. ;
Olson, Adam ;
Russell, Jacob ;
Clark, Brittany .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2012, 42 (02) :331-347
[28]   A study on Classification of Insider threat using Markov Chain Model [J].
Kim, Dong-Wook ;
Hong, Sung-Sam ;
Han, Myung-Mook .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (04) :1887-1898
[29]   An Insider Threat Prediction Model [J].
Kandias, Miltiadis ;
Mylonas, Alexios ;
Virvilis, Nikos ;
Theoharidou, Marianthi ;
Gritzalis, Dimitris .
TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2010, 6264 :26-37
[30]   Addressing the Insider Threat Introduction [J].
Pfleeger, Shari Lawrence ;
Stolfo, Salvatore J. .
IEEE SECURITY & PRIVACY, 2009, 7 (06) :10-13