Abstract
Malicious insider threats are difficult to detect and to mitigate. Many approaches for explaining behaviour exist, but there is little work to relate them to formal approaches to insider threat detection. In this work we present a general formal framework to perform analysis for malicious insider threats, based on probabilistic modelling, verification, and synthesis techniques. The framework first identifies insiders’ intention to perform an inside attack, using Bayesian networks, and in a second phase computes the probability of success for an inside attack by this actor, using probabilistic model checking.
Original language | English |
---|---|
Title of host publication | Proceedings of the third International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS 2015) |
Editors | Theo Tryfonas, Ioannis Askoxylakis |
Publisher | Springer |
Publication date | 2015 |
Pages | 178-189 |
ISBN (Print) | 978-3-319-20375-1 |
ISBN (Electronic) | 978-3-319-20376-8 |
DOIs | |
Publication status | Published - 2015 |
Event | 3rd International Conference on Human Aspects of Information Security, Privacy and Trust (HAS 2015) - Los Angeles, United States Duration: 2 Aug 2015 → 7 Aug 2015 Conference number: 3 http://2015.hci.international/has |
Conference
Conference | 3rd International Conference on Human Aspects of Information Security, Privacy and Trust (HAS 2015) |
---|---|
Number | 3 |
Country/Territory | United States |
City | Los Angeles |
Period | 02/08/2015 → 07/08/2015 |
Other | Held as Part of HCI International 2015 |
Internet address |
Series | Lecture Notes in Computer Science |
---|---|
Volume | 9190 |
ISSN | 0302-9743 |