Modeling insider threat types in cyber organizations

Eunice E. Santos, Eugene Santos, John Korah, Jeremy E. Thompson, Vairavan Murugappan, Suresh Subramanian, Yan Zhao

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Insider threats can cause immense damage to organizations of different types, including government, corporate, and non-profit organizations. Being an insider, however, does not necessarily equate to being a threat. Effectively identifying valid threats, and assessing the type of threat an insider presents, remain difficult challenges. In this work, we propose a novel breakdown of eight insider threat types, identified by using three insider traits: predictability, susceptibility, and awareness. In addition to presenting this framework for insider threat types, we implement a computational model to demonstrate the viability of our framework with synthetic scenarios devised after reviewing real world insider threat case studies. The results yield useful insights into how further investigation might proceed to reveal how best to gauge predictability, susceptibility, and awareness, and precisely how they relate to the eight insider types.

Original languageEnglish (US)
Title of host publication2017 IEEE International Symposium on Technologies for Homeland Security, HST 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781509063567
DOIs
StatePublished - Jun 7 2017
Externally publishedYes
Event2017 IEEE International Symposium on Technologies for Homeland Security, HST 2017 - Waltham, United States
Duration: Apr 25 2017Apr 26 2017

Publication series

Name2017 IEEE International Symposium on Technologies for Homeland Security, HST 2017

Conference

Conference2017 IEEE International Symposium on Technologies for Homeland Security, HST 2017
Country/TerritoryUnited States
CityWaltham
Period4/25/174/26/17

Keywords

  • Bayesian knowledge bases (BKBs)
  • Behavioral modeling
  • Computational modeling
  • Cyber security
  • Insider threat
  • Manipulation
  • Social modeling
  • Trust

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Computer Vision and Pattern Recognition
  • Safety Research

Fingerprint

Dive into the research topics of 'Modeling insider threat types in cyber organizations'. Together they form a unique fingerprint.

Cite this