Modeling and verification of insider threats using logical analysis
Article
Kammueller, F. and Probst, C. 2017. Modeling and verification of insider threats using logical analysis. IEEE Systems Journal. 11 (2), pp. 534-545. https://doi.org/10.1109/JSYST.2015.2453215
Type | Article |
---|---|
Title | Modeling and verification of insider threats using logical analysis |
Authors | Kammueller, F. and Probst, C. |
Abstract | In this paper we combine formal modeling and analysis of infrastructures of organisations with sociological explanation to provide a framework for insider threat analysis. We use the Higher Order Logic proof assistant Isabelle/HOL to support this framework. In the formal model, we exhibit and use a common trick from the formal verification of security protocols showing that it is applicable to insider threats. We introduce briefly a three step process of social explanation illustrating that it can be applied fruitfully to the characterisation of insider threats. We introduce the Insider theory constructed in Isabelle that implements this process of social explanation. To validate that the social explanation is generally useful for the analysis of insider threats and to demonstrate our framework, we model and verify the insider threat patterns Entitled Independent and Ambitious Leader in our Isabelle/HOL framework. |
Publisher | Institute of Electrical and Electronics Engineers (IEEE) |
Journal | IEEE Systems Journal |
ISSN | 1932-8184 |
Electronic | 1937-9234 |
Publication dates | |
Online | 03 Aug 2015 |
26 Jun 2017 | |
Publication process dates | |
Deposited | 23 Apr 2015 |
Accepted | 29 Jun 2015 |
Output status | Published |
Accepted author manuscript | File Access Level Open |
Copyright Statement | © 2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. |
Digital Object Identifier (DOI) | https://doi.org/10.1109/JSYST.2015.2453215 |
Language | English |
https://repository.mdx.ac.uk/item/8513v
Download files
Accepted author manuscript
ModelingAndVerificationOfInsiderThreatsUsingLogicalAnalysis_paper_final.pdf | ||
File access level: Open |
67
total views6
total downloads1
views this month0
downloads this month