Modeling of Insider Threat using Enterprise Automaton

被引:0
|
作者
Roy, Puloma [1 ]
Mazumdar, Chandan [1 ]
机构
[1] Jadavpur Univ, Ctr Distributed Comp, Kolkata, India
关键词
Enterprise process; Insider; Insider Threat; Insider Attacker;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Substantial portions of attacks on the security of enterprises are perpetrated by Insiders having authorized privileges. Thus insider threat and attack detection is an important aspect of Security management. In the published literature, efforts are on to model the insider threats based on the behavioral traits of employees. The psycho-social behaviors are hard to encode in the software systems. Also, in some cases, there are privacy issues involved. In this paper, the human and non-human agents in a system are described in a novel unified model. The enterprise is described as an automaton and its states are classified secure, safe, unsafe and compromised. The insider agents and threats are modeled on the basis of the automaton and the model is validated using a case study.
引用
收藏
页数:4
相关论文
共 50 条
  • [31] Developing an insider threat model using functional decomposition
    Butts, JW
    Mills, RF
    Baldwin, RO
    COMPUTER NETWORK SECURITY, PROCEEDINGS, 2005, 3685 : 412 - 417
  • [32] Reflections on the insider threat
    Pfleeger, Charles P.
    INSIDER ATTACK AND CYBER SECURITY: BEYOND THE HACKER, 2008, 39 : 5 - 15
  • [33] Insider Threat Detection Using Machine Learning Approach
    Sarhan, Bushra Bin
    Altwaijry, Najwa
    APPLIED SCIENCES-BASEL, 2023, 13 (01):
  • [34] Insider Threat Detection using Virtual Machine Introspection
    Crawford, Martin
    Peterson, Gilbert
    PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 1821 - 1830
  • [35] Survival analysis for insider threatDetecting insider threat incidents using survival analysis techniques
    Elie Alhajjar
    Taylor Bradley
    Computational and Mathematical Organization Theory, 2022, 28 : 335 - 351
  • [36] Insight Into Insiders and IT: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures
    Homoliak, Ivan
    Toffalini, Flavio
    Guarnizo, Juan
    Elovici, Yuval
    Ochoa, Martin
    ACM COMPUTING SURVEYS, 2019, 52 (02)
  • [37] Full-featured information equalization modeling for insider threat detection
    Liu Y.
    Luo S.-L.
    Qu L.-W.
    Pan L.-M.
    Zhang J.
    Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2019, 53 (04): : 777 - 784
  • [38] Modeling Worm Propagation and Insider Threat in Air-Gapped Network using Modified SEIQV Model
    Safar, Jamie L.
    Tummala, Murali
    McEachen, John C.
    Bollmann, Chad
    2019 13TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS), 2019,
  • [39] Insider threat detection for specific threat scenarios
    Tian, Tian
    Zhang, Chen
    Jiang, Bo
    Feng, Huamin
    Lu, Zhigang
    CYBERSECURITY, 2025, 8 (01):
  • [40] Insider Threat Data Expansion Research using Hyperledger Fabric
    Yoon, Wonseok
    Chang, HangBae
    2022 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON22), 2022, : 25 - 28