Modeling Human Behavior to Anticipate Insider Attacks

نویسندگان

  • Frank L. Greitzer
  • Ryan E. Hohimer
چکیده

The insider threat ranks among the most pressing cyber-security challenges that threaten government and industry information infrastructures. To date, no systematic methods have been developed that provide a complete and effective approach to prevent data leakage, espionage, and sabotage. Current practice is forensic in nature, relegating to the analyst the bulk of the responsibility to monitor, analyze, and correlate an overwhelming amount of data. We describe a predictive modeling framework that integrates a diverse set of data sources from the cyber domain, as well as inferred psychological/motivational factors that may underlie malicious insider exploits. This comprehensive threat assessment approach provides automated support for the detection of high-risk behavioral "triggers" to help focus the analyst's attention and inform the analysis. Designed to be domain-independent, the system may be applied to many different threat and warning analysis/sense-making problems. This article is available in Journal of Strategic Security: http://scholarcommons.usf.edu/jss/ vol4/iss2/3 Journal of Strategic Security Volume IV Issue 2 2011, pp. 25-48 DOI: 10.5038/1944-0472.4.2.2 Journal of Strategic Security (c) 2011 ISSN: 1944-0464 eISSN: 1944-0472 25 Modeling Human Behavior to Anticipate Insider Attacks Frank L. Greitzer Ryan E. Hohimer Pacific Northwest National Laboratory Richland, WA USA [email protected]

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Insider attack and real-time data mining of user behavior

Early detection of employees’ improper access to sensitive or valuable data is critical to limiting negative financial impacts to an organization, including regulatory penalties for misuse of customer data that results from these insider attacks. Implementing a system for detecting insider attacks is a technical challenge that also involves business-process changes and decision making that prio...

متن کامل

Addressing Insider Threats and Information Leakage

Insider threats are one of the problems of organizational security that are most difficult to handle. It is often unclear whether or not an actor is an insider, or what we actually mean by “insider”. It also is often impossible to determine whether an insider action is permissible, or whether it constitutes an insider attack. From a technical standpoint, the biggest concern is the discriminatio...

متن کامل

A framework for understanding and predicting insider attacks

In this paper an insider attack is considered to be deliberate misuse by those who are authorized to use computers and networks. Applying this definition in real-life settings to determine whether or not an attack was caused by an insider is often, however, anything but straightforward. We know very little about insider attacks, and misconceptions concerning insider attacks abound. The belief t...

متن کامل

G-SIR: An Insider Attack Resilient Geo-Social Access Control Framework

Insider attacks are among the most dangerous and costly attacks to organizations. These attacks are carried out by individuals who are legitimately authorized to access the system. Preventing insider attacks is a daunting task. The recent proliferation of social media and mobile devices offer new opportunities to collect geo-social information that can help in detecting and deterring insider at...

متن کامل

Enhanced Beta Trust Model for Identifying Insider Attacks in Wireless Sensor Networks

Wireless sensor networks (WSN) are more prone to insider and outsider attacks as the sensor nodes are deployed in open environment for collecting data. The traditional cryptography based security mechanisms such as authentication and authorization are able to sort out issues of outside attacker, but they are not effective against insider attacks. Trust based approaches are used to defend agains...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017