Modeling Human Behavior to Anticipate Insider Attacks
The insider threat ranks among the most pressing cyber-security challenges that threaten government and industry information infrastructures. To date, no systematic methods have been developed that provide a complete and effective approach to prevent data leakage, espionage, and sabotage. Current pr...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Henley-Putnam University
2011-01-01
|
Series: | Journal of Strategic Security |
Subjects: | |
Online Access: | http://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1094&context=jss |
id |
doaj-03375319cc9c4287ad16c1f744e9fa4b |
---|---|
record_format |
Article |
spelling |
doaj-03375319cc9c4287ad16c1f744e9fa4b2020-11-24T23:55:52ZengHenley-Putnam UniversityJournal of Strategic Security1944-04641944-04722011-01-01422548Modeling Human Behavior to Anticipate Insider AttacksRyan E HohimerFrank L GreitzerThe insider threat ranks among the most pressing cyber-security challenges that threaten government and industry information infrastructures. To date, no systematic methods have been developed that provide a complete and effective approach to prevent data leakage, espionage, and sabotage. Current practice is forensic in nature, relegating to the analyst the bulk of the responsibility to monitor, analyze, and correlate an overwhelming amount of data. We describe a predictive modeling framework that integrates a diverse set of data sources from the cyber domain, as well as inferred psychological/motivational factors that may underlie malicious insider exploits. This comprehensive threat assessment approach provides automated support for the detection of high-risk behavioral "triggers" to help focus the analyst's attention and inform the analysis. Designed to be domain-independent, the system may be applied to many different threat and warning analysis/sense-making problems.http://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1094&context=jssCorporate securityCybersecurityIntelligence analysisSecurity managementTerrorism / counterterrorismThreat assessment |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Ryan E Hohimer Frank L Greitzer |
spellingShingle |
Ryan E Hohimer Frank L Greitzer Modeling Human Behavior to Anticipate Insider Attacks Journal of Strategic Security Corporate security Cybersecurity Intelligence analysis Security management Terrorism / counterterrorism Threat assessment |
author_facet |
Ryan E Hohimer Frank L Greitzer |
author_sort |
Ryan E Hohimer |
title |
Modeling Human Behavior to Anticipate Insider Attacks |
title_short |
Modeling Human Behavior to Anticipate Insider Attacks |
title_full |
Modeling Human Behavior to Anticipate Insider Attacks |
title_fullStr |
Modeling Human Behavior to Anticipate Insider Attacks |
title_full_unstemmed |
Modeling Human Behavior to Anticipate Insider Attacks |
title_sort |
modeling human behavior to anticipate insider attacks |
publisher |
Henley-Putnam University |
series |
Journal of Strategic Security |
issn |
1944-0464 1944-0472 |
publishDate |
2011-01-01 |
description |
The insider threat ranks among the most pressing cyber-security challenges that threaten government and industry information infrastructures. To date, no systematic methods have been developed that provide a complete and effective approach to prevent data leakage, espionage, and sabotage. Current practice is forensic in nature, relegating to the analyst the bulk of the responsibility to monitor, analyze, and correlate an overwhelming amount of data. We describe a predictive modeling framework that integrates a diverse set of data sources from the cyber domain, as well as inferred psychological/motivational factors that may underlie malicious insider exploits. This comprehensive threat assessment approach provides automated support for the detection of high-risk behavioral "triggers" to help focus the analyst's attention and inform the analysis. Designed to be domain-independent, the system may be applied to many different threat and warning analysis/sense-making problems. |
topic |
Corporate security Cybersecurity Intelligence analysis Security management Terrorism / counterterrorism Threat assessment |
url |
http://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1094&context=jss |
work_keys_str_mv |
AT ryanehohimer modelinghumanbehaviortoanticipateinsiderattacks AT franklgreitzer modelinghumanbehaviortoanticipateinsiderattacks |
_version_ |
1725460859762769920 |