Model based analysis of insider threats
Conference paper
Chen, T., Han, T., Kammueller, F., Nemli, I. and Probst, C. 2016. Model based analysis of insider threats. 2016 International Conference on Cyber Security and Protection of Digital Services (Cyber Security). London, United Kingdom 13 - 14 Jun 2016 Institute of Electrical and Electronics Engineers (IEEE). https://doi.org/10.1109/CyberSecPODS.2016.7502350
Type | Conference paper |
---|---|
Title | Model based analysis of insider threats |
Authors | Chen, T., Han, T., Kammueller, F., Nemli, I. and Probst, C. |
Abstract | In order to detect malicious insider attacks it is important to model and analyse infrastructures and policies of organisations and the insiders acting within them. We extend formal approaches that allow modelling such scenarios by quantitative aspects to enable a precise analysis of security designs. Our framework enables evaluating the risks of an insider attack to happen quantitatively. The framework first identifies an insider's intention to perform an inside attack, using Bayesian networks, and in a second phase computes the probability of success for an inside attack by this actor, using probabilistic model checking. We provide prototype tool support using Matlab for Bayesian networks and PRISM for the analysis of Markov decision processes, and validate the framework with case studies. |
Conference | 2016 International Conference on Cyber Security and Protection of Digital Services (Cyber Security) |
ISBN | |
Hardcover | 978-1-5090-0709-7 |
Publisher | Institute of Electrical and Electronics Engineers (IEEE) |
Publication dates | |
01 Oct 2016 | |
Online | 11 Jul 2016 |
Publication process dates | |
Deposited | 13 Jun 2017 |
Accepted | 02 Aug 2016 |
Output status | Published |
Accepted author manuscript | |
Copyright Statement | © 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. |
Digital Object Identifier (DOI) | https://doi.org/10.1109/CyberSecPODS.2016.7502350 |
Language | English |
Book title | Proceedings of the 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security) |
https://repository.mdx.ac.uk/item/8702v
Download files
42
total views17
total downloads2
views this month0
downloads this month