A method for insider threat assessment by modeling the internal employee interactions

被引:1
|
作者
Sepehrzadeh, Hamed [1 ]
机构
[1] Tech & Vocat Univ TVU, Dept Comp Engn, Tehran, Iran
关键词
Information security; Threats; Influence; Organization; Employee; Evaluation;
D O I
10.1007/s10207-023-00697-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Insider's information security threat is one of the most critical issues in organizations. Due to their access to the assets and their knowledge about the systems, they pose a significant threat on organizations. It is difficult to distinguish between the behavior of normal employee and anomalous one due to its complex nature. It is important to predict the potential of occurring an undesired behavior of by an employee before taking place a security failure. An employee with a high degree of threat may try to influence other colleagues to encourage them to behave improperly and cause an information security breach. Therefore, analyzing the relationships between colleagues and assessing the influence propagation of insider threats play an important role in information security improvement process. This paper introduces an approach for modeling the relationships between colleagues to estimate the impact propagation of insider threats in organizations. The proposed approach has two main phases. In the first phase, the potential threat level of the organization employees is evaluated using the human and organizational factors of information security questionary. In the second phase, by modeling the employee's relationships, the influence propagation of threats is estimated. The introduced model is based on directed graph structure, and it is parameterized by the employee's threat values obtained from the first stage of the presented approach. We want to investigate how malicious or unacceptable behavior of an employee may affect the behavior of other employees and how can we model and evaluate this issue?
引用
收藏
页码:1385 / 1393
页数:9
相关论文
共 50 条
  • [1] A method for insider threat assessment by modeling the internal employee interactions
    Hamed Sepehrzadeh
    International Journal of Information Security, 2023, 22 : 1385 - 1393
  • [2] A Method of Evaluation for Insider Threat
    Wang, Yi-Lu
    Yang, Sang-Chin
    2014 INTERNATIONAL SYMPOSIUM ON COMPUTER, CONSUMER AND CONTROL (IS3C 2014), 2014, : 438 - 441
  • [3] Modeling the emergence of insider threat vulnerabilities
    Martinez-Moyano, Ignacio J.
    Rich, Eliot H.
    Conrad, Stephen H.
    Andersen, David F.
    PROCEEDINGS OF THE 2006 WINTER SIMULATION CONFERENCE, VOLS 1-5, 2006, : 562 - +
  • [4] AGENT IMPLEMENTATION FOR MODELING INSIDER THREAT
    Sokolowski, John A.
    Banks, Catherine M.
    2015 WINTER SIMULATION CONFERENCE (WSC), 2015, : 266 - 275
  • [5] Towards a theory of insider threat assessment
    Chinchani, R
    Iyer, A
    Ngo, HQ
    Upadhyaya, S
    2005 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2005, : 108 - 117
  • [6] The insider threat and employee privacy: An overview of recent case law
    Huth, Carly L.
    COMPUTER LAW & SECURITY REVIEW, 2013, 29 (04) : 368 - 381
  • [7] Caught in the Act of an Insider Attack: Detection and Assessment of Insider Threat
    Legg, Philip A.
    Buckley, Oliver
    Goldsmith, Michael
    Creese, Sadie
    2015 IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2015,
  • [8] Probabilistic Modeling of Insider Threat Detection Systems
    Ruttenberg, Brian
    Blumstein, Dave
    Druce, Jeff
    Howard, Michael
    Reed, Fred
    Wilfong, Leslie
    Lister, Crystal
    Gaskin, Steve
    Foley, Meaghan
    Scofield, Dan
    GRAPHICAL MODELS FOR SECURITY, 2018, 10744 : 91 - 98
  • [9] Modeling of Insider Threat using Enterprise Automaton
    Roy, Puloma
    Mazumdar, Chandan
    PROCEEDINGS OF 2018 FIFTH INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2018,
  • [10] Modeling Insider Threat Types in Cyber Organizations
    Santos, Eunice E.
    Santos, Eugene, Jr.
    Korah, John
    Thompson, Jeremy E.
    Murugappan, Vairavan
    Subramanian, Suresh
    Zhao, Yan
    2017 IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2017,