Modeling of Insider Threat using Enterprise Automaton

被引:0
|
作者
Roy, Puloma [1 ]
Mazumdar, Chandan [1 ]
机构
[1] Jadavpur Univ, Ctr Distributed Comp, Kolkata, India
关键词
Enterprise process; Insider; Insider Threat; Insider Attacker;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Substantial portions of attacks on the security of enterprises are perpetrated by Insiders having authorized privileges. Thus insider threat and attack detection is an important aspect of Security management. In the published literature, efforts are on to model the insider threats based on the behavioral traits of employees. The psycho-social behaviors are hard to encode in the software systems. Also, in some cases, there are privacy issues involved. In this paper, the human and non-human agents in a system are described in a novel unified model. The enterprise is described as an automaton and its states are classified secure, safe, unsafe and compromised. The insider agents and threats are modeled on the basis of the automaton and the model is validated using a case study.
引用
收藏
页数:4
相关论文
共 50 条
  • [11] Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat
    Buckley, Oliver
    Nurse, Jason R. C.
    Legg, Philip A.
    Goldsmith, Michael
    Creese, Sadie
    2014 4TH WORKSHOP ON SOCIO-TECHNICAL ASPECTS IN SECURITY AND TRUST (STAST 2014), 2014, : 8 - 15
  • [12] Survival analysis for insider threat Detecting insider threat incidents using survival analysis techniques
    Alhajjar, Elie
    Bradley, Taylor
    COMPUTATIONAL AND MATHEMATICAL ORGANIZATION THEORY, 2022, 28 (04) : 335 - 351
  • [13] Creating a Digital Twin of an Insider Threat Detection Enterprise Using Model-Based Systems Engineering
    Lee, James
    Alghamdi, Ahmad
    Zaidi, Abbas K.
    SYSCON 2022: THE 16TH ANNUAL IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON), 2022,
  • [14] Insider Threat Modeling: An Adversarial Risk Analysis Approach
    Joshi, Chaitanya
    Aliaga, Jesus Rios
    Insua, David Rios
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 1131 - 1142
  • [15] Introduction to the special issue on insider threat modeling and simulation
    Moore, Andrew P.
    Kennedy, Kirk A.
    Dover, Thomas J.
    COMPUTATIONAL AND MATHEMATICAL ORGANIZATION THEORY, 2016, 22 (03) : 261 - 272
  • [16] Introduction to insider threat modeling, detection, and mitigation track
    Dodge Jr., Ronald C.
    Ferguson, Aaron J.
    Cappelli, Dawn M.
    Proceedings of the Annual Hawaii International Conference on System Sciences, 2012,
  • [17] Introduction to Insider Threat Modeling, Detection, and Mitigation Track
    Dodge, Ronald C., Jr.
    Ferguson, Aaron J.
    Cappelli, Dawn M.
    PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 1812 - 1812
  • [18] An agent-based approach to modeling insider threat
    Sokolowski, John A.
    Banks, Catherine M.
    Dover, Thomas J.
    COMPUTATIONAL AND MATHEMATICAL ORGANIZATION THEORY, 2016, 22 (03) : 273 - 287
  • [19] Modeling and Mitigating the Insider Threat of Remote Administrators in Clouds
    Alhebaishi, Nawaf
    Wang, Lingyu
    Jajodia, Sushil
    Singhal, Anoop
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXII, DBSEC 2018, 2018, 10980 : 3 - 20
  • [20] Introduction to the special issue on insider threat modeling and simulation
    Andrew P. Moore
    Kirk A. Kennedy
    Thomas J. Dover
    Computational and Mathematical Organization Theory, 2016, 22 : 261 - 272