Modeling Human Behavior to Anticipate Insider Attacks

The insider threat ranks among the most pressing cyber-security challenges that threaten government and industry information infrastructures. To date, no systematic methods have been developed that provide a complete and effective approach to prevent data leakage, espionage, and sabotage. Current pr...

Full description

Bibliographic Details
Main Authors: Ryan E Hohimer, Frank L Greitzer
Format: Article
Language:English
Published: Henley-Putnam University 2011-01-01
Series:Journal of Strategic Security
Subjects:
Online Access:http://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1094&context=jss
id doaj-03375319cc9c4287ad16c1f744e9fa4b
record_format Article
spelling doaj-03375319cc9c4287ad16c1f744e9fa4b2020-11-24T23:55:52ZengHenley-Putnam UniversityJournal of Strategic Security1944-04641944-04722011-01-01422548Modeling Human Behavior to Anticipate Insider AttacksRyan E HohimerFrank L GreitzerThe insider threat ranks among the most pressing cyber-security challenges that threaten government and industry information infrastructures. To date, no systematic methods have been developed that provide a complete and effective approach to prevent data leakage, espionage, and sabotage. Current practice is forensic in nature, relegating to the analyst the bulk of the responsibility to monitor, analyze, and correlate an overwhelming amount of data. We describe a predictive modeling framework that integrates a diverse set of data sources from the cyber domain, as well as inferred psychological/motivational factors that may underlie malicious insider exploits. This comprehensive threat assessment approach provides automated support for the detection of high-risk behavioral "triggers" to help focus the analyst's attention and inform the analysis. Designed to be domain-independent, the system may be applied to many different threat and warning analysis/sense-making problems.http://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1094&context=jssCorporate securityCybersecurityIntelligence analysisSecurity managementTerrorism / counterterrorismThreat assessment
collection DOAJ
language English
format Article
sources DOAJ
author Ryan E Hohimer
Frank L Greitzer
spellingShingle Ryan E Hohimer
Frank L Greitzer
Modeling Human Behavior to Anticipate Insider Attacks
Journal of Strategic Security
Corporate security
Cybersecurity
Intelligence analysis
Security management
Terrorism / counterterrorism
Threat assessment
author_facet Ryan E Hohimer
Frank L Greitzer
author_sort Ryan E Hohimer
title Modeling Human Behavior to Anticipate Insider Attacks
title_short Modeling Human Behavior to Anticipate Insider Attacks
title_full Modeling Human Behavior to Anticipate Insider Attacks
title_fullStr Modeling Human Behavior to Anticipate Insider Attacks
title_full_unstemmed Modeling Human Behavior to Anticipate Insider Attacks
title_sort modeling human behavior to anticipate insider attacks
publisher Henley-Putnam University
series Journal of Strategic Security
issn 1944-0464
1944-0472
publishDate 2011-01-01
description The insider threat ranks among the most pressing cyber-security challenges that threaten government and industry information infrastructures. To date, no systematic methods have been developed that provide a complete and effective approach to prevent data leakage, espionage, and sabotage. Current practice is forensic in nature, relegating to the analyst the bulk of the responsibility to monitor, analyze, and correlate an overwhelming amount of data. We describe a predictive modeling framework that integrates a diverse set of data sources from the cyber domain, as well as inferred psychological/motivational factors that may underlie malicious insider exploits. This comprehensive threat assessment approach provides automated support for the detection of high-risk behavioral "triggers" to help focus the analyst's attention and inform the analysis. Designed to be domain-independent, the system may be applied to many different threat and warning analysis/sense-making problems.
topic Corporate security
Cybersecurity
Intelligence analysis
Security management
Terrorism / counterterrorism
Threat assessment
url http://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1094&context=jss
work_keys_str_mv AT ryanehohimer modelinghumanbehaviortoanticipateinsiderattacks
AT franklgreitzer modelinghumanbehaviortoanticipateinsiderattacks
_version_ 1725460859762769920