• DocumentCode
    1311204
  • Title

    Intelligence Analyses and the Insider Threat

  • Author

    Santos, Eugene, Jr. ; Nguyen, Hien ; Yu, Fei ; Kim, Keum Joo ; Li, Deqing ; Wilkinson, John T. ; Olson, Adam ; Russell, Jacob ; Clark, Brittany

  • Author_Institution
    Thayer Sch. of Eng., Dartmouth Coll., Hanover, NH, USA
  • Volume
    42
  • Issue
    2
  • fYear
    2012
  • fDate
    3/1/2012 12:00:00 AM
  • Firstpage
    331
  • Lastpage
    347
  • Abstract
    In the intelligence community, the existence of a malicious insider poses a severe threat to information, to the actual analytic process, and, ultimately, to any decision-making process relying on such information and analyses. An analyst with malicious intent can create irreversible short-term, as well as long-term, damage that is hard to detect. In this paper, we propose a novel methodology that detects malicious analysts who attempt to manipulate decision makers´ perceptions through their intelligence reports. This detection method relies on each analyst´s working style, which we assume to be consistent from task to task. In order to measure an analyst´s degree of consistency, we employ a user-modeling technique that automatically builds a computational model of each analyst based on observation of their activities. We hypothesize that inconsistency is mainly caused by malicious actions. Therefore, the detection method evaluates how consistent an analyst is across different tasks and raises an alert if any significantly large inconsistency is detected. A normalization procedure is employed which allows us to compare across a group of analysts and is shown to reduce noise and amplify inconsistency that is due to malicious actions. We show that this improves detection performance. Our experiments demonstrate the effectiveness of our approach in detecting malicious insiders. In the experiments, the percentage of malicious insiders grouped with legitimate ones is varied, and results are collected with and without normalization in order to provide a comprehensive analysis of our approach.
  • Keywords
    decision making; security of data; analyst inconsistency detection; decision-making process; information threat; insider threat; intelligence analyses; intelligence community; malicious actions; malicious analysts detection; malicious insider detection; malicious intent; user-modeling technique; Analytical models; Context; Correlation; Feature extraction; Integrated circuits; Organizations; Psychology; Cognitive styles; decision-making process; insider threat; intelligence analyses;
  • fLanguage
    English
  • Journal_Title
    Systems, Man and Cybernetics, Part A: Systems and Humans, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1083-4427
  • Type

    jour

  • DOI
    10.1109/TSMCA.2011.2162500
  • Filename
    6006537