Detecting Threatening Behavior Using Bayesian Networks

dc.contributor.authorAlGhamdi, Ghazi
dc.contributor.authorLaskey, Kathryn B.
dc.contributor.authorWang, Xun
dc.contributor.authorBarbará, Daniel
dc.contributor.authorShackelford, Thomas
dc.contributor.authorWright, Edward J.
dc.contributor.authorFitzgerald, Julie
dc.date.accessioned2006-03-06T15:11:39Z
dc.date.available2006-03-06T15:11:39Z
dc.date.issued2006-03-06T15:11:39Z
dc.descriptionThe views, opinions, and findings contained in this paper are those of the author(s) and should not be construed as an official position, policy, or decision, of ARDA, the Department of the Interior, or the US Navy unless so designated by other official documentationen
dc.description.abstractThis paper presents an innovative use of human behavior models for detecting insider threats to information systems. While most work in information security concerns detecting and responding to intruders, violations of system security policy by authorized computer users present a major threat to information security. A promising approach to detection and response is to model behavior of normal users and threats, and apply sophisticated inference methods to detect patterns of behavior that deviate from normal behavior in ways suggesting a possible security threat. This paper presents an approach, based on multi-entity Bayesian networks, to modeling user queries and detecting situations in which users in sensitive positions may be accessing documents outside their assigned areas of responsibility. Such unusual access patterns might be characteristic of users attempting illegal activities such as disclosure of classified information. We present a scalable proof of concept behavior model, provide an experimental demonstration of its ability to detect unusual access patterns in simulated situations, and describe future plans to increase the realism and fidelity of the model.
dc.description.sponsorshipWork for this paper was performed under funding provided by the Advanced Research and Development Activity (ARDA), under contract NBCHC030059, issued by the Department of the Interior. Additional support was provided by the US Navy.en
dc.format.extent178168 bytes
dc.format.mimetypeapplication/pdf
dc.identifier.urihttps://hdl.handle.net/1920/541
dc.identifier.urihttps://ite.gmu.edu/~klaskey/papers/BRIMS04_InsiderThreat.pdf
dc.language.isoen_US
dc.relation.ispartofseriesC3I-04-01en
dc.subjectInformation security
dc.subjectBehavioral model
dc.subjectMulti-entity Bayesian networks
dc.subjectDocument relevance
dc.subjectInsider threat detection
dc.subjectAccess control
dc.titleDetecting Threatening Behavior Using Bayesian Networks
dc.typePresentation
dc.typeTechnical Report

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
C3I-04-01.pdf
Size:
173.99 KB
Format:
Adobe Portable Document Format
Description:
BRIMS04_InsiderThreat
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.72 KB
Format:
Item-specific license agreed upon to submission
Description: