DocumentCode :
2336865
Title :
Performance analysis of an insider threat mitigation model
Author :
Althebyan, Qutaibah ; Panda, Brajendra
Author_Institution :
Univ. of Arkansas, Fayetteville, AR
fYear :
2008
fDate :
13-16 Nov. 2008
Firstpage :
703
Lastpage :
709
Abstract :
In this work, we presented an approach to extract knowledge out of an object. A graph theory approach to represent and manage the knowledge is explained. We then presented a performance analysis for an insider threat mitigation model proposed earlier. We relied on some characteristics of the insiders and the decomposition of objects in the underlying system in developing our method and conducting our simulation. Our modelpsilas results showed great resistance against such attacks.
Keywords :
graph theory; knowledge acquisition; security of data; graph theory; insider threat mitigation model; knowledge extraction; performance analysis; Computational modeling; Computer crime; Graph theory; Humans; Information systems; Information technology; Knowledge management; Performance analysis; Performance evaluation; Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Digital Information Management, 2008. ICDIM 2008. Third International Conference on
Conference_Location :
London
Print_ISBN :
978-1-4244-2916-5
Electronic_ISBN :
978-1-4244-2917-2
Type :
conf
DOI :
10.1109/ICDIM.2008.4746709
Filename :
4746709
Link To Document :
بازگشت