A method for insider threat assessment by modeling the internal employee interactions

被引:1
|
作者
Sepehrzadeh, Hamed [1 ]
机构
[1] Tech & Vocat Univ TVU, Dept Comp Engn, Tehran, Iran
关键词
Information security; Threats; Influence; Organization; Employee; Evaluation;
D O I
10.1007/s10207-023-00697-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Insider's information security threat is one of the most critical issues in organizations. Due to their access to the assets and their knowledge about the systems, they pose a significant threat on organizations. It is difficult to distinguish between the behavior of normal employee and anomalous one due to its complex nature. It is important to predict the potential of occurring an undesired behavior of by an employee before taking place a security failure. An employee with a high degree of threat may try to influence other colleagues to encourage them to behave improperly and cause an information security breach. Therefore, analyzing the relationships between colleagues and assessing the influence propagation of insider threats play an important role in information security improvement process. This paper introduces an approach for modeling the relationships between colleagues to estimate the impact propagation of insider threats in organizations. The proposed approach has two main phases. In the first phase, the potential threat level of the organization employees is evaluated using the human and organizational factors of information security questionary. In the second phase, by modeling the employee's relationships, the influence propagation of threats is estimated. The introduced model is based on directed graph structure, and it is parameterized by the employee's threat values obtained from the first stage of the presented approach. We want to investigate how malicious or unacceptable behavior of an employee may affect the behavior of other employees and how can we model and evaluate this issue?
引用
收藏
页码:1385 / 1393
页数:9
相关论文
共 50 条
  • [21] Insider Threat Likelihood Assessment for Flexible Access Control
    Boulares, Sofiene
    Adi, Kamel
    Logrippo, Luigi
    E-TECHNOLOGIES: EMBRACING THE INTERNET OF THINGS, MCETECH 2017, 2017, 289 : 77 - 95
  • [22] Insider Threat Event Detection in User-System Interactions
    Moriano, Pablo
    Pendleton, Jared
    Rich, Steven
    Camp, L. Jean
    PROCEEDINGS OF THE 2017 INTERNATIONAL WORKSHOP ON MANAGING INSIDER SECURITY THREATS (MIST'17), 2017, : 1 - 12
  • [23] Insider threat analysis using information-centric modeling
    Ha, D.
    Upadhyaya, S.
    Ngo, H.
    Pramanik, S.
    Chinchani, R.
    Mathew, S.
    ADVANCES IN DIGITAL FORENSIC III, 2007, 242 : 55 - +
  • [24] A Vector Relational Data Modeling approach to Insider Threat intelligence
    Kelly, Ryan F.
    Anderson, Thomas S.
    GROUND/AIR MULTISENSOR INTEROPERABILITY, INTEGRATION, AND NETWORKING FOR PERSISTENT ISR VII, 2016, 9831
  • [25] Research on insider threat detection method based on variational autoencoding
    Zhang, Zhenjiang
    Zhao, Lulu
    Zhang, Yang
    Zhou, Hongde
    Li, Wei
    Journal of Computers (Taiwan), 2021, 32 (04) : 201 - 210
  • [26] An insider threat detection method based on business process mining
    Zhu, Taiming
    Guo, Yuanbo
    Ju, Ankang
    Ma, Jun
    Wang, Xuan
    International Journal of Business Data Communications and Networking, 2017, 13 (02): : 83 - 98
  • [27] An Insider Threat Investigation Method by Graph Analysis with Log Texts
    Fei, Kexiong
    Zhou, Jiang
    PROCEEDINGS OF THE 2024 3RD INTERNATIONAL CONFERENCE ON NETWORKS, COMMUNICATIONS AND INFORMATION TECHNOLOGY, CNCIT 2024, 2024, : 19 - 23
  • [28] An Insider Threat Detection Method Based on User Behavior Analysis
    Jiang, Wei
    Tian, Yuan
    Liu, Weixin
    Liu, Wenmao
    INTELLIGENT INFORMATION PROCESSING IX, 2018, 538 : 421 - 429
  • [29] Insight Into Insiders and IT: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures
    Homoliak, Ivan
    Toffalini, Flavio
    Guarnizo, Juan
    Elovici, Yuval
    Ochoa, Martin
    ACM COMPUTING SURVEYS, 2019, 52 (02)
  • [30] Full-featured information equalization modeling for insider threat detection
    Liu Y.
    Luo S.-L.
    Qu L.-W.
    Pan L.-M.
    Zhang J.
    Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2019, 53 (04): : 777 - 784