Developing an insider threat model using functional decomposition

被引:0
|
作者
Butts, JW [1 ]
Mills, RF [1 ]
Baldwin, RO [1 ]
机构
[1] USAF, Inst Technol, Dayton, OH 45433 USA
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Addressing the insider threat using a systematic and formulated methodology is an inherently difficult process. This is because the problem is typically viewed in an abstract manner and a sufficient method for defining a way to categorically represent the threat has not been developed. The solution requires a security model that clearly identifies a process for classifying malicious insider activities. To be effective the model must compartmentalize the threat and attack it consistently. The purpose of this paper is to present a methodology for accurately defining the malicious insider and describe a process for addressing the threat in a systematic manner. Our model presents a definable taxonomy of the malicious insider and demonstrates a method for decomposing the abstract threat into a solvable and analyzable process.
引用
收藏
页码:412 / 417
页数:6
相关论文
共 50 条
  • [21] Insider Threat Detection Using Machine Learning Approach
    Sarhan, Bushra Bin
    Altwaijry, Najwa
    APPLIED SCIENCES-BASEL, 2023, 13 (01):
  • [22] Insider Threat Detection using Virtual Machine Introspection
    Crawford, Martin
    Peterson, Gilbert
    PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 1821 - 1830
  • [23] Survival analysis for insider threatDetecting insider threat incidents using survival analysis techniques
    Elie Alhajjar
    Taylor Bradley
    Computational and Mathematical Organization Theory, 2022, 28 : 335 - 351
  • [24] Insider Threat Detection Model Enhancement Using Hybrid Algorithms between Unsupervised and Supervised Learning
    Yi, Junkai
    Tian, Yongbo
    ELECTRONICS, 2024, 13 (05)
  • [25] Insider threat detection for specific threat scenarios
    Tian, Tian
    Zhang, Chen
    Jiang, Bo
    Feng, Huamin
    Lu, Zhigang
    CYBERSECURITY, 2025, 8 (01):
  • [26] A prediction model of insider threat based on multi-agent
    Wang, Hui
    Liu, Shufen
    Zhang, Xinjia
    2006 1ST INTERNATIONAL SYMPOSIUM ON PERVASIVE COMPUTING AND APPLICATIONS, PROCEEDINGS, 2006, : 273 - +
  • [27] Enhanced Insider Threat Detection Model that Increases Data Availability
    Yaseen, Qussai
    Panda, Brajendra
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, 2011, 6536 : 267 - 277
  • [28] Insider Threat Data Expansion Research using Hyperledger Fabric
    Yoon, Wonseok
    Chang, HangBae
    2022 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON22), 2022, : 25 - 28
  • [29] Using Dirichlet Marked Hawkes Processes for Insider Threat Detection
    Zheng, Panpan
    Yuan, Shuhan
    Wu, Xintao
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2022, 3 (01):
  • [30] Using dynamic models to support inferences of insider threat risk
    Paul J. Sticha
    Elise T. Axelrad
    Computational and Mathematical Organization Theory, 2016, 22 : 350 - 381