Modeling of Insider Threat using Enterprise Automaton

被引:0
作者
Roy, Puloma [1 ]
Mazumdar, Chandan [1 ]
机构
[1] Jadavpur Univ, Ctr Distributed Comp, Kolkata, India
来源
PROCEEDINGS OF 2018 FIFTH INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT) | 2018年
关键词
Enterprise process; Insider; Insider Threat; Insider Attacker;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Substantial portions of attacks on the security of enterprises are perpetrated by Insiders having authorized privileges. Thus insider threat and attack detection is an important aspect of Security management. In the published literature, efforts are on to model the insider threats based on the behavioral traits of employees. The psycho-social behaviors are hard to encode in the software systems. Also, in some cases, there are privacy issues involved. In this paper, the human and non-human agents in a system are described in a novel unified model. The enterprise is described as an automaton and its states are classified secure, safe, unsafe and compromised. The insider agents and threats are modeled on the basis of the automaton and the model is validated using a case study.
引用
收藏
页数:4
相关论文
共 50 条
[31]   Behavioral Based Insider Threat Detection Using Deep Learning [J].
Nasir, Rida ;
Afzal, Mehreen ;
Latif, Rabia ;
Iqbal, Waseem .
IEEE ACCESS, 2021, 9 :143266-143274
[32]   Supervised Learning for Insider Threat Detection Using Stream Mining [J].
Parveen, Pallabi ;
Weger, Zackary R. ;
Thuraisingham, Bhavani ;
Hamlen, Kevin ;
Khan, Latifur .
2011 23RD IEEE INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI 2011), 2011, :1032-1039
[33]   Using dynamic models to support inferences of insider threat risk [J].
Sticha, Paul J. ;
Axelrad, Elise T. .
COMPUTATIONAL AND MATHEMATICAL ORGANIZATION THEORY, 2016, 22 (03) :350-381
[34]   Insider Threat Mitigation Using Moving Target Defense and Deception [J].
Takabi, Hassan ;
Jafarian, J. Haadi .
PROCEEDINGS OF THE 2017 INTERNATIONAL WORKSHOP ON MANAGING INSIDER SECURITY THREATS (MIST'17), 2017, :93-96
[35]   Insider Threat Detection in PRODIGAL [J].
Goldberg, Henry G. ;
Young, William T. ;
Reardon, Matthew G. ;
Phillips, Brian J. ;
Senator, Ted E. .
PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, :2648-2657
[36]   A Method of Evaluation for Insider Threat [J].
Wang, Yi-Lu ;
Yang, Sang-Chin .
2014 INTERNATIONAL SYMPOSIUM ON COMPUTER, CONSUMER AND CONTROL (IS3C 2014), 2014, :438-441
[37]   Insider threat detection within embedded weapon systems [J].
Haan, Nicholas ;
Grimaila, Michael ;
Patel, Raju .
3RD INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, PROCEEDINGS, 2008, :163-+
[38]   Cybercrime Countermeasure of Insider Threat Investigation [J].
Kao, Da-Yu .
2019 21ST INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ICT FOR 4TH INDUSTRIAL REVOLUTION, 2019, :413-418
[39]   Weak models for insider threat detection [J].
Thompson, P .
SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE(C31) TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE III, PTS 1 AND 2, 2004, 5403 :40-48
[40]   The Dynamic Nature of Insider Threat Indicators [J].
Frank L. Greitzer ;
Justin Purl .
SN Computer Science, 2022, 3 (2)