A method for insider threat assessment by modeling the internal employee interactions

被引:1
|
作者
Sepehrzadeh, Hamed [1 ]
机构
[1] Tech & Vocat Univ TVU, Dept Comp Engn, Tehran, Iran
关键词
Information security; Threats; Influence; Organization; Employee; Evaluation;
D O I
10.1007/s10207-023-00697-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Insider's information security threat is one of the most critical issues in organizations. Due to their access to the assets and their knowledge about the systems, they pose a significant threat on organizations. It is difficult to distinguish between the behavior of normal employee and anomalous one due to its complex nature. It is important to predict the potential of occurring an undesired behavior of by an employee before taking place a security failure. An employee with a high degree of threat may try to influence other colleagues to encourage them to behave improperly and cause an information security breach. Therefore, analyzing the relationships between colleagues and assessing the influence propagation of insider threats play an important role in information security improvement process. This paper introduces an approach for modeling the relationships between colleagues to estimate the impact propagation of insider threats in organizations. The proposed approach has two main phases. In the first phase, the potential threat level of the organization employees is evaluated using the human and organizational factors of information security questionary. In the second phase, by modeling the employee's relationships, the influence propagation of threats is estimated. The introduced model is based on directed graph structure, and it is parameterized by the employee's threat values obtained from the first stage of the presented approach. We want to investigate how malicious or unacceptable behavior of an employee may affect the behavior of other employees and how can we model and evaluate this issue?
引用
收藏
页码:1385 / 1393
页数:9
相关论文
共 50 条
  • [31] Comprehensiveness of Response to Internal Cyber-Threat and Selection of Methods to Identify the Insider
    Zhurin, Sergey Igorevich
    JOURNAL OF ICT RESEARCH AND APPLICATIONS, 2015, 8 (03) : 251 - 269
  • [32] Insider Threat Likelihood Assessment for Access Control Systems: Quantitative Approach
    Boulares, Sofiene
    Adi, Kamel
    Logrippo, Luigi
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2016, 2017, 10128 : 135 - 142
  • [33] A Graph Convolution Neural Network Based Method for Insider Threat Detection
    Fei, Kexiong
    Zhou, Jiang
    Su, Lin
    Wang, Weiping
    Chen, Yong
    Zhang, Fan
    2022 IEEE INTL CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, BIG DATA & CLOUD COMPUTING, SUSTAINABLE COMPUTING & COMMUNICATIONS, SOCIAL COMPUTING & NETWORKING, ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM, 2022, : 66 - 73
  • [34] Insider Threat Detection Based on User Behavior Modeling and Anomaly Detection Algorithms
    Kim, Junhong
    Park, Minsik
    Kim, Haedong
    Cho, Suhyoun
    Kang, Pilsung
    APPLIED SCIENCES-BASEL, 2019, 9 (19):
  • [35] A study of insider threat in nuclear security analysis using game theoretic modeling
    Kim, Kyo-Nam
    Yim, Man-Sung
    Schneider, Erich
    ANNALS OF NUCLEAR ENERGY, 2017, 108 : 301 - 309
  • [36] An assessment of opportunity-reducing techniques in information security: An insider threat perspective
    Padayachee, Keshnee
    DECISION SUPPORT SYSTEMS, 2016, 92 : 47 - 56
  • [37] Shadow-IT System and Insider Threat: An Assessment of an Opportunity Dimension for the Identity Theft
    Shaikh, Asif
    HCI INTERNATIONAL 2018 - POSTERS' EXTENDED ABSTRACTS, PT III, 2018, 852 : 314 - 317
  • [38] A Fuzzy Multicriteria Aggregation method for Data Analytics: application to Insider Threat Monitoring
    Palomares, Ivan
    Kalutarage, Harsha
    Huang, Yan
    Miller, Paul
    McCausland, Robert
    McWilliams, Gavin
    2017 JOINT 17TH WORLD CONGRESS OF INTERNATIONAL FUZZY SYSTEMS ASSOCIATION AND 9TH INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND INTELLIGENT SYSTEMS (IFSA-SCIS), 2017,
  • [39] Modeling Expert Judgments of Insider Threat Using Ontology Structure: Effects of Individual Indicator Threat Value and Class Membership
    Greitzer, Frank L.
    Purl, Justin
    Becker, D. E.
    Sticha, Paul J.
    Leong, Yung Mei
    PROCEEDINGS OF THE 52ND ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2019, : 3202 - 3211
  • [40] 'The Enabling Role of Internal Organizational Communication in Insider Threat Activity - Evidence From a High Security Organization'
    Rice, Charis
    Searle, Rosalind H.
    MANAGEMENT COMMUNICATION QUARTERLY, 2022, 36 (03) : 467 - 495