DocumentCode
1311204
Title
Intelligence Analyses and the Insider Threat
Author
Santos, Eugene, Jr. ; Nguyen, Hien ; Yu, Fei ; Kim, Keum Joo ; Li, Deqing ; Wilkinson, John T. ; Olson, Adam ; Russell, Jacob ; Clark, Brittany
Author_Institution
Thayer Sch. of Eng., Dartmouth Coll., Hanover, NH, USA
Volume
42
Issue
2
fYear
2012
fDate
3/1/2012 12:00:00 AM
Firstpage
331
Lastpage
347
Abstract
In the intelligence community, the existence of a malicious insider poses a severe threat to information, to the actual analytic process, and, ultimately, to any decision-making process relying on such information and analyses. An analyst with malicious intent can create irreversible short-term, as well as long-term, damage that is hard to detect. In this paper, we propose a novel methodology that detects malicious analysts who attempt to manipulate decision makers´ perceptions through their intelligence reports. This detection method relies on each analyst´s working style, which we assume to be consistent from task to task. In order to measure an analyst´s degree of consistency, we employ a user-modeling technique that automatically builds a computational model of each analyst based on observation of their activities. We hypothesize that inconsistency is mainly caused by malicious actions. Therefore, the detection method evaluates how consistent an analyst is across different tasks and raises an alert if any significantly large inconsistency is detected. A normalization procedure is employed which allows us to compare across a group of analysts and is shown to reduce noise and amplify inconsistency that is due to malicious actions. We show that this improves detection performance. Our experiments demonstrate the effectiveness of our approach in detecting malicious insiders. In the experiments, the percentage of malicious insiders grouped with legitimate ones is varied, and results are collected with and without normalization in order to provide a comprehensive analysis of our approach.
Keywords
decision making; security of data; analyst inconsistency detection; decision-making process; information threat; insider threat; intelligence analyses; intelligence community; malicious actions; malicious analysts detection; malicious insider detection; malicious intent; user-modeling technique; Analytical models; Context; Correlation; Feature extraction; Integrated circuits; Organizations; Psychology; Cognitive styles; decision-making process; insider threat; intelligence analyses;
fLanguage
English
Journal_Title
Systems, Man and Cybernetics, Part A: Systems and Humans, IEEE Transactions on
Publisher
ieee
ISSN
1083-4427
Type
jour
DOI
10.1109/TSMCA.2011.2162500
Filename
6006537
Link To Document