A method for insider threat assessment by modeling the internal employee interactions

被引:1
|
作者
Sepehrzadeh, Hamed [1 ]
机构
[1] Tech & Vocat Univ TVU, Dept Comp Engn, Tehran, Iran
关键词
Information security; Threats; Influence; Organization; Employee; Evaluation;
D O I
10.1007/s10207-023-00697-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Insider's information security threat is one of the most critical issues in organizations. Due to their access to the assets and their knowledge about the systems, they pose a significant threat on organizations. It is difficult to distinguish between the behavior of normal employee and anomalous one due to its complex nature. It is important to predict the potential of occurring an undesired behavior of by an employee before taking place a security failure. An employee with a high degree of threat may try to influence other colleagues to encourage them to behave improperly and cause an information security breach. Therefore, analyzing the relationships between colleagues and assessing the influence propagation of insider threats play an important role in information security improvement process. This paper introduces an approach for modeling the relationships between colleagues to estimate the impact propagation of insider threats in organizations. The proposed approach has two main phases. In the first phase, the potential threat level of the organization employees is evaluated using the human and organizational factors of information security questionary. In the second phase, by modeling the employee's relationships, the influence propagation of threats is estimated. The introduced model is based on directed graph structure, and it is parameterized by the employee's threat values obtained from the first stage of the presented approach. We want to investigate how malicious or unacceptable behavior of an employee may affect the behavior of other employees and how can we model and evaluate this issue?
引用
收藏
页码:1385 / 1393
页数:9
相关论文
共 50 条
  • [41] Modeling Expert Judgments of Insider Threat Using Ontology Structure: Effects of Individual Indicator Threat Value and Class Membership
    Greitzer, Frank L.
    Purl, Justin
    Becker, D. E.
    Sticha, Paul J.
    Leong, Yung Mei
    PROCEEDINGS OF THE 52ND ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2019, : 3202 - 3211
  • [42] 'The Enabling Role of Internal Organizational Communication in Insider Threat Activity - Evidence From a High Security Organization'
    Rice, Charis
    Searle, Rosalind H.
    MANAGEMENT COMMUNICATION QUARTERLY, 2022, 36 (03) : 467 - 495
  • [43] Web application threat modeling and quantitative assessment
    National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing 100029, China
    Qinghua Daxue Xuebao, 2009, SUPPL. 2 (2108-2112):
  • [44] Assessment method for driving threat perception
    Guo, Z.-Z. (guozizheng@swjtu.edu.cn), 1600, Editorial Board of Jilin University (42):
  • [45] An insider threat detection method based on improved Test-Time Training model
    Tao, Xiaoling
    Liu, Jianxiang
    Yu, Yuelin
    Zhang, Haijing
    Huang, Ying
    HIGH-CONFIDENCE COMPUTING, 2025, 5 (01):
  • [46] TOWARDS A USER AND ROLE-BASED BEHAVIOR ANALYSIS METHOD FOR INSIDER THREAT DETECTION
    Lv, Qiujian
    Wang, Yan
    Wang, Leigi
    Wang, Dan
    PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT (IEEE IC-NIDC), 2018, : 6 - 10
  • [47] Automated Insider Threat Detection System Using User and Role-Based Profile Assessment
    Legg, Philip A.
    Buckley, Oliver
    Goldsmith, Michael
    Creese, Sadie
    IEEE SYSTEMS JOURNAL, 2017, 11 (02): : 503 - 512
  • [48] A Risk Assessment based RBAC using Attack Graphs to Mitigate Insider Threat during UAQ
    Bardhan, Shuvo
    2024 IEEE 48TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC 2024, 2024, : 1440 - 1443
  • [49] Application of the threat modeling method in an operating system
    Yokoyama, Rodrigo
    Arima, Carlos Hideo
    REVISTA DE GESTAO E SECRETARIADO-GESEC, 2023, 14 (04): : 5102 - 5122
  • [50] Employee Performance Assessment with Profile Matching Method
    Safrizal
    Tanti, Lili
    Puspasari, Ratih
    Triandi, Budi
    2018 6TH INTERNATIONAL CONFERENCE ON CYBER AND IT SERVICE MANAGEMENT (CITSM), 2018, : 553 - 558