A method for insider threat assessment by modeling the internal employee interactions

被引:1
|
作者
Sepehrzadeh, Hamed [1 ]
机构
[1] Tech & Vocat Univ TVU, Dept Comp Engn, Tehran, Iran
关键词
Information security; Threats; Influence; Organization; Employee; Evaluation;
D O I
10.1007/s10207-023-00697-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Insider's information security threat is one of the most critical issues in organizations. Due to their access to the assets and their knowledge about the systems, they pose a significant threat on organizations. It is difficult to distinguish between the behavior of normal employee and anomalous one due to its complex nature. It is important to predict the potential of occurring an undesired behavior of by an employee before taking place a security failure. An employee with a high degree of threat may try to influence other colleagues to encourage them to behave improperly and cause an information security breach. Therefore, analyzing the relationships between colleagues and assessing the influence propagation of insider threats play an important role in information security improvement process. This paper introduces an approach for modeling the relationships between colleagues to estimate the impact propagation of insider threats in organizations. The proposed approach has two main phases. In the first phase, the potential threat level of the organization employees is evaluated using the human and organizational factors of information security questionary. In the second phase, by modeling the employee's relationships, the influence propagation of threats is estimated. The introduced model is based on directed graph structure, and it is parameterized by the employee's threat values obtained from the first stage of the presented approach. We want to investigate how malicious or unacceptable behavior of an employee may affect the behavior of other employees and how can we model and evaluate this issue?
引用
收藏
页码:1385 / 1393
页数:9
相关论文
共 50 条
  • [41] Web application threat modeling and quantitative assessment
    National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing 100029, China
    Qinghua Daxue Xuebao, 2009, SUPPL. 2 (2108-2112):
  • [42] Assessment method for driving threat perception
    Guo, Z.-Z. (guozizheng@swjtu.edu.cn), 1600, Editorial Board of Jilin University (42):
  • [43] An insider threat detection method based on improved Test-Time Training model
    Tao, Xiaoling
    Liu, Jianxiang
    Yu, Yuelin
    Zhang, Haijing
    Huang, Ying
    High-Confidence Computing, 2025, 5 (01):
  • [44] TOWARDS A USER AND ROLE-BASED BEHAVIOR ANALYSIS METHOD FOR INSIDER THREAT DETECTION
    Lv, Qiujian
    Wang, Yan
    Wang, Leigi
    Wang, Dan
    PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT (IEEE IC-NIDC), 2018, : 6 - 10
  • [45] Automated Insider Threat Detection System Using User and Role-Based Profile Assessment
    Legg, Philip A.
    Buckley, Oliver
    Goldsmith, Michael
    Creese, Sadie
    IEEE SYSTEMS JOURNAL, 2017, 11 (02): : 503 - 512
  • [46] Application of the threat modeling method in an operating system
    Yokoyama, Rodrigo
    Arima, Carlos Hideo
    REVISTA DE GESTAO E SECRETARIADO-GESEC, 2023, 14 (04): : 5102 - 5122
  • [47] Employee Performance Assessment with Profile Matching Method
    Safrizal
    Tanti, Lili
    Puspasari, Ratih
    Triandi, Budi
    2018 6TH INTERNATIONAL CONFERENCE ON CYBER AND IT SERVICE MANAGEMENT (CITSM), 2018, : 553 - 558
  • [48] Risk Assessment Method for Insider Threats in Cyber Security: A Review
    Hashim, Nurul Akmal
    Abidin, Zaheera Zainal
    Zakaria, Nurul Azma
    Ahmad, Rabiah
    Puvanasvaran, A. P.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (11) : 126 - 130
  • [49] Modeling Worm Propagation and Insider Threat in Air-Gapped Network using Modified SEIQV Model
    Safar, Jamie L.
    Tummala, Murali
    McEachen, John C.
    Bollmann, Chad
    2019 13TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS), 2019,
  • [50] Risk modeling, assessment, and management of lahar flow threat
    Leung, MF
    Santos, JR
    Haimes, YY
    RISK ANALYSIS, 2003, 23 (06) : 1323 - 1335