Developing an insider threat model using functional decomposition

被引:0
|
作者
Butts, JW [1 ]
Mills, RF [1 ]
Baldwin, RO [1 ]
机构
[1] USAF, Inst Technol, Dayton, OH 45433 USA
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Addressing the insider threat using a systematic and formulated methodology is an inherently difficult process. This is because the problem is typically viewed in an abstract manner and a sufficient method for defining a way to categorically represent the threat has not been developed. The solution requires a security model that clearly identifies a process for classifying malicious insider activities. To be effective the model must compartmentalize the threat and attack it consistently. The purpose of this paper is to present a methodology for accurately defining the malicious insider and describe a process for addressing the threat in a systematic manner. Our model presents a definable taxonomy of the malicious insider and demonstrates a method for decomposing the abstract threat into a solvable and analyzable process.
引用
收藏
页码:412 / 417
页数:6
相关论文
共 50 条
  • [1] Developing a conceptual model for insider threat
    Whitty, Monica T.
    JOURNAL OF MANAGEMENT & ORGANIZATION, 2021, 27 (05) : 911 - 929
  • [2] An Insider Threat Prediction Model
    Kandias, Miltiadis
    Mylonas, Alexios
    Virvilis, Nikos
    Theoharidou, Marianthi
    Gritzalis, Dimitris
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2010, 6264 : 26 - 37
  • [3] A study on Classification of Insider threat using Markov Chain Model
    Kim, Dong-Wook
    Hong, Sung-Sam
    Han, Myung-Mook
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (04): : 1887 - 1898
  • [4] Scalable predicting model for insider threat
    College of Computer Science and Technology, Jilin University, Changchun 130012, China
    不详
    Jisuanji Xuebao, 2006, 8 (1346-1355):
  • [5] Survival analysis for insider threat Detecting insider threat incidents using survival analysis techniques
    Alhajjar, Elie
    Bradley, Taylor
    COMPUTATIONAL AND MATHEMATICAL ORGANIZATION THEORY, 2022, 28 (04) : 335 - 351
  • [6] Performance Analysis of an Insider Threat Mitigation Model
    Althebyan, Qutaibah
    Panda, Brajendra
    2008 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT, VOLS 1 AND 2, 2008, : 719 - 725
  • [7] Developing Visualisations to Enhance an Insider Threat Product: A Case Study
    Graham, Martin
    Kukla, Robert
    Mandrychenko, Oleksii
    Hart, Darren
    Kennedy, Jessie
    2021 IEEE SYMPOSIUM ON VISUALIZATION FOR CYBER SECURITY (VIZSEC 2021), 2021, : 47 - 57
  • [8] An Access Abstraction Model for Mitigating the Insider Threat
    Jenkins, Jonathan
    ACMSE 2020: PROCEEDINGS OF THE 2020 ACM SOUTHEAST CONFERENCE, 2020, : 320 - 321
  • [9] Hybrid deep learning model using SPCAGAN augmentation for insider threat analysis
    Gayathri, R. G.
    Sajjanhar, Atul
    Xiang, Yong
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 249
  • [10] Modeling of Insider Threat using Enterprise Automaton
    Roy, Puloma
    Mazumdar, Chandan
    PROCEEDINGS OF 2018 FIFTH INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2018,