Modeling Insider Behavior Using Multi-Entity Bayesian Networks

dc.contributor.authorAlGhamdi, Ghazi
dc.contributor.authorLaskey, Kathryn B.
dc.contributor.authorWright, Edward J.
dc.contributor.authorBarbará, Daniel
dc.contributor.authorChang, K.C.
dc.date.accessioned2006-03-06T15:01:08Z
dc.date.available2006-03-06T15:01:08Z
dc.date.issued2006-03-06T15:01:08Z
dc.description.abstractThis paper tackles a key aspect of the information security problem: modeling the behavior of insider threats. The specific problem addressed by this paper is the identification of malicious insider behavior in trusted computing environments. Although most security techniques in intrusion detection systems (IDS’s) focus on protecting the system boundaries from outside attacks, defending against an insider who attempts to misuse privileges is an equally significant problem for network security. It is usually assumed that users who are given access to network resources can be trusted. However, the eighth annual CSI/FBI 2003 report found that insider abuse of network access was the most cited form of attack or abuse. 80% of respondents were concerned about insider abuse, although 92% of the responding organizations employed some form of access control mechanism [7]. Therefore, though insider users are legally granted access to network resources, it is essential to protect against misuse by insiders. This paper presents a scalable model to represent insider behavior. We provide simulation experiments to demonstrate the ability of the model to detect threat behavior. Information security objectives can be accomplished through a layered approach that represents several lines of defense. This approach constitutes one of these lines of defense.
dc.description.sponsorshipWork for this paper was performed under funding provided by the Advanced Research and Development Activity (ARDA), under contract NBCHC030059, issued by the Department of the Interior. Additional support was provided by the US Navyen
dc.format.extent471775 bytes
dc.format.mimetypeapplication/pdf
dc.identifier.urihttps://hdl.handle.net/1920/539
dc.identifier.urihttps://ite.gmu.edu/~klaskey/papers/10th_ICCRTS_Paper_271.pdf
dc.language.isoen_US
dc.relation.ispartofseriesC4I-05-09en
dc.subjectMulti-entity Bayesian networks
dc.subjectBayesian networks
dc.subjectInformation security
dc.subjectMalicious insider behavior
dc.subjectNetwork security
dc.titleModeling Insider Behavior Using Multi-Entity Bayesian Networks
dc.typePresentation
dc.typeTechnical Report

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
C4I-05-09.pdf
Size:
460.72 KB
Format:
Adobe Portable Document Format
Description:
10th_ICCRTS_Paper_271
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.72 KB
Format:
Item-specific license agreed upon to submission
Description: