Modeling Insider Threat Types in Cyber Organizations

被引:0
|
作者
Santos, Eunice E. [1 ]
Santos, Eugene, Jr. [2 ]
Korah, John [1 ]
Thompson, Jeremy E. [2 ]
Murugappan, Vairavan [1 ]
Subramanian, Suresh [1 ]
Zhao, Yan [2 ]
机构
[1] IIT, Dept Comp Sci, Chicago, IL 60616 USA
[2] Dartmouth Coll, Thayer Sch Engn, Hanover, NH 03755 USA
关键词
Bayesian knowledge bases (BKBs); insider threat; computational modeling; behavioral modeling; social modeling; trust; manipulation; cyber security;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Insider threats can cause immense damage to organizations of different types, including government, corporate, and non-profit organizations. Being an insider, however, does not necessarily equate to being a threat. Effectively identifying valid threats, and assessing the type of threat an insider presents, remain difficult challenges. In this work, we propose a novel breakdown of eight insider threat types, identified by using three insider traits: predictability, susceptibility, and awareness. In addition to presenting this framework for insider threat types, we implement a computational model to demonstrate the viability of our framework with synthetic scenarios devised after reviewing real world insider threat case studies. The results yield useful insights into how further investigation might proceed to reveal how best to gauge predictability, susceptibility, and awareness, and precisely how they relate to the eight insider types.
引用
收藏
页数:7
相关论文
共 50 条
  • [21] An agent-based approach to modeling insider threat
    Sokolowski, John A.
    Banks, Catherine M.
    Dover, Thomas J.
    COMPUTATIONAL AND MATHEMATICAL ORGANIZATION THEORY, 2016, 22 (03) : 273 - 287
  • [22] Modeling and Mitigating the Insider Threat of Remote Administrators in Clouds
    Alhebaishi, Nawaf
    Wang, Lingyu
    Jajodia, Sushil
    Singhal, Anoop
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXII, DBSEC 2018, 2018, 10980 : 3 - 20
  • [23] Introduction to the special issue on insider threat modeling and simulation
    Andrew P. Moore
    Kirk A. Kennedy
    Thomas J. Dover
    Computational and Mathematical Organization Theory, 2016, 22 : 261 - 272
  • [24] An agent-based approach to modeling insider threat
    John A. Sokolowski
    Catherine M. Banks
    Thomas J. Dover
    Computational and Mathematical Organization Theory, 2016, 22 : 273 - 287
  • [25] CONNECTED AIRCRAFT: CYBER-SAFETY RISKS, INSIDER THREAT, AND MANAGEMENT APPROACHES
    Pollard, Todd
    Clark, Jason
    PROCEEDINGS OF THE 52ND ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2019, : 3232 - 3241
  • [26] Leader's dilemma game: An experimental design for cyber insider threat research
    Ho, Shuyuan Mary
    Warkentin, Merrill
    INFORMATION SYSTEMS FRONTIERS, 2017, 19 (02) : 377 - 396
  • [27] System Dynamics Approach to Malicious Insider Cyber-Threat Modelling and Analysis
    Fagade, Tesleem
    Spyridopoulos, Theo
    Albishry, Nabeel
    Tryfonas, Theo
    HUMAN ASPECTS OF INFORMATION SECURITY, PRIVACY AND TRUST (HAS 2017), 2017, 10292 : 309 - 321
  • [28] Leader’s dilemma game: An experimental design for cyber insider threat research
    Shuyuan Mary Ho
    Merrill Warkentin
    Information Systems Frontiers, 2017, 19 : 377 - 396
  • [29] CPID: Insider threat detection using profiling and cyber-persona identification
    Racherache, Badis
    Shirani, Paria
    Soeanu, Andrei
    Debbabi, Mourad
    COMPUTERS & SECURITY, 2023, 132
  • [30] Insider Cyber Threat Situational Awareness Framwork using Dynamic Bayesian Networks
    Tang, Ke
    Zhou, Ming-Tian
    Wang, Wen-Yong
    ICCSSE 2009: PROCEEDINGS OF 2009 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, 2009, : 1146 - 1150