Title :
Performance analysis of an insider threat mitigation model
Author :
Althebyan, Qutaibah ; Panda, Brajendra
Author_Institution :
Univ. of Arkansas, Fayetteville, AR
Abstract :
In this work, we presented an approach to extract knowledge out of an object. A graph theory approach to represent and manage the knowledge is explained. We then presented a performance analysis for an insider threat mitigation model proposed earlier. We relied on some characteristics of the insiders and the decomposition of objects in the underlying system in developing our method and conducting our simulation. Our modelpsilas results showed great resistance against such attacks.
Keywords :
graph theory; knowledge acquisition; security of data; graph theory; insider threat mitigation model; knowledge extraction; performance analysis; Computational modeling; Computer crime; Graph theory; Humans; Information systems; Information technology; Knowledge management; Performance analysis; Performance evaluation; Security;
Conference_Titel :
Digital Information Management, 2008. ICDIM 2008. Third International Conference on
Conference_Location :
London
Print_ISBN :
978-1-4244-2916-5
Electronic_ISBN :
978-1-4244-2917-2
DOI :
10.1109/ICDIM.2008.4746709