Modeling of Insider Threat using Enterprise Automaton

被引:0
作者
Roy, Puloma [1 ]
Mazumdar, Chandan [1 ]
机构
[1] Jadavpur Univ, Ctr Distributed Comp, Kolkata, India
来源
PROCEEDINGS OF 2018 FIFTH INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT) | 2018年
关键词
Enterprise process; Insider; Insider Threat; Insider Attacker;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Substantial portions of attacks on the security of enterprises are perpetrated by Insiders having authorized privileges. Thus insider threat and attack detection is an important aspect of Security management. In the published literature, efforts are on to model the insider threats based on the behavioral traits of employees. The psycho-social behaviors are hard to encode in the software systems. Also, in some cases, there are privacy issues involved. In this paper, the human and non-human agents in a system are described in a novel unified model. The enterprise is described as an automaton and its states are classified secure, safe, unsafe and compromised. The insider agents and threats are modeled on the basis of the automaton and the model is validated using a case study.
引用
收藏
页数:4
相关论文
共 50 条
[41]   Analytics for early detection of insider threat [J].
Fenstermacher, Laurie ;
Larson, Kathleen ;
Vitiello, Christine ;
Shellman, Steve ;
Levey, Brian .
SIGNAL PROCESSING, SENSOR/INFORMATION FUSION, AND TARGET RECOGNITION XXXI, 2022, 12122
[42]   A Tripwire Grammar for Insider Threat Detection [J].
Agrafiotis, Ioannis ;
Erola, Arnau ;
Goldsmith, Michael ;
Creese, Sadie .
MIST'16: PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON MANAGING INSIDER SECURITY THREATS, 2016, :105-108
[43]   Detecting Unknown Insider Threat Scenarios [J].
Young, William T. ;
Memory, Alex ;
Goldberg, Henry G. ;
Senator, Ted E. .
2014 IEEE SECURITY AND PRIVACY WORKSHOPS (SPW 2014), 2014, :277-288
[44]   Machine Learning for Insider Threat Detection [J].
Naicker, Tristan Sashlen ;
van Niekerk, Brett .
PROCEEDINGS OF THE 3RD EUROPEAN CONFERENCE ON THE IMPACT OF ARTIFICIAL INTELLIGENCE AND ROBOTICS (ECIAIR 2021), 2021, :122-131
[45]   Developing an 'Insider Language Index' as a composite measure to detect insider threat [J].
Martlew, Natasha G. ;
Ball, Linden J. ;
Dando, Coral J. ;
Ormerod, Thomas C. ;
Taylor, Paul J. ;
Menacere, Tarek ;
Sandham, Alexandra L. ;
Richardson, Beth H. .
PSYCHIATRY PSYCHOLOGY AND LAW, 2025,
[46]   Developing a conceptual model for insider threat [J].
Whitty, Monica T. .
JOURNAL OF MANAGEMENT & ORGANIZATION, 2021, 27 (05) :911-929
[47]   Scenarios Using Situation Awareness in a Simulation Environment for Eliciting Insider Threat Behavior [J].
Reinerman-Jones, Lauren ;
Matthews, Gerald ;
Wohleber, Ryan ;
Ortiz, Eric .
2017 IEEE CONFERENCE ON COGNITIVE AND COMPUTATIONAL ASPECTS OF SITUATION MANAGEMENT (COGSIMA), 2017,
[48]   Hybrid deep learning model using SPCAGAN augmentation for insider threat analysis [J].
Gayathri, R. G. ;
Sajjanhar, Atul ;
Xiang, Yong .
EXPERT SYSTEMS WITH APPLICATIONS, 2024, 249
[49]   Analyzing Data Granularity Levels for Insider Threat Detection Using Machine Learning [J].
Le, Duc C. ;
Zincir-Heywood, Nur ;
Heywood, Malcolm I. .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (01) :30-44
[50]   Insider Threat Detection using Deep Autoencoder and Variational Autoencoder Neural Networks [J].
Pantelidis, Efthimios ;
Bendiab, Gueltoum ;
Shiaeles, Stavros ;
Kolokotronis, Nicholas .
PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, :129-134