Loading...
Please wait, while we are loading the content...
Similar Documents
Detecting Threatening Behavior Using Bayesian Networks (2004)
| Content Provider | CiteSeerX |
|---|---|
| Author | Ghazi, Kathryn Laskey Laskey, Kathryn Alghamdi, Ghazi Wang, Xun Barbará, Daniel Shackelford, Tom Fitzgerald, Julie |
| Description | This paper presents an innovative use of human behavior models for detecting insider threats to information systems. While most work in information security concerns detecting and responding to intruders, violations of system security policy by authorized computer users present a major threat to information security. A promising approach to detection and response is to model behavior of normal users and threats, and apply sophisticated inference methods to detect patterns of behavior that deviate from normal behavior in ways suggesting a possible security threat. This paper presents an approach, based on multi-entity Bayesian networks, to modeling user queries and detecting situations in which users in sensitive positions may be accessing documents outside their assigned areas of responsibility. Such unusual access patterns might be characteristic of users attempting illegal activities such as disclosure of classified information. We present a scalable proof of concept behavior model, provide an experimental demonstration of its ability to detect unusual access patterns in simulated situations, and describe future plans to increase the realism and fidelity of the model. |
| File Format | |
| Language | English |
| Publisher | BRIMS |
| Publisher Date | 2004-01-01 |
| Publisher Institution | Proceedings of the Conference on Behavioral Representation in Modeling and Simulation |
| Access Restriction | Open |
| Subject Keyword | Authorized Computer User Human Behavior Model Illegal Activity Promising Approach Classified Information Scalable Proof Information Security Possible Security Threat Concept Behavior Model Assigned Area Sophisticated Inference Method Multi-entity Bayesian Network Information System Sensitive Position Unusual Access Pattern Behavior Using Bayesian Network Information Security Concern Major Threat Innovative Use Future Plan Simulated Situation Insider Threat System Security Policy Normal Behavior User Query Normal User Experimental Demonstration |
| Content Type | Text |
| Resource Type | Article |