DocumentCode :
480819
Title :
Intent-Driven Insider Threat Detection in Intelligence Analyses
Author :
Santos, Eugene, Jr. ; Nguyen, Hien ; Yu, Fei ; Kim, Keumjoo ; Li, Deqing ; Wilkinson, John T. ; Olson, Adam ; Jacob, Russell
Author_Institution :
Thayer Sch. of Eng., Hanover, NH
Volume :
2
fYear :
2008
fDate :
9-12 Dec. 2008
Firstpage :
345
Lastpage :
349
Abstract :
When decisions need to be made in government, the intelligence community (IC) is tasked with analyzing the situation. This analysis is based on a huge amount of information and usually under severe time constraints. As such, it is particularly vulnerable to attacks from insiders with malicious intent. A malicious insider may alter, fabricate, or hide critical information in their analytical products, such as reports, in order to interfere with the decision making process. In this paper, we focus on detecting such malicious insiders. Malicious actions such as disinformation tend to be very subtle and thus difficult to detect. Therefore, we employ a user modeling technique to model an insider based on logged information and documents accessed while accomplishing an intelligence analysis task. We create a computational model for each insider and apply several detection metrics to analyze this model as it changes over time. If any deviation of behavior is detected, alerts can be issued. A pilot test revealed that the computed deviations had a high correlation with insiderspsila cognitive styles. Based on this finding, we designed a framework that minimized the impact of differences in cognitive styles. In our evaluation, we used data collected from intelligence analysts, and simulated malicious insiders based on this data. A high percentage of the simulated malicious insiders were successfully detected.
Keywords :
security of data; user modelling; intelligence analyses; intent-driven insider threat detection; logged information; user modeling technique; Computational intelligence; Computational modeling; Decision making; Educational institutions; Government; Information analysis; Intelligent agent; Interference constraints; Jacobian matrices; Time factors; insider threats; intelligence analyses; intelligence community; user modeling;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Web Intelligence and Intelligent Agent Technology, 2008. WI-IAT '08. IEEE/WIC/ACM International Conference on
Conference_Location :
Sydney, NSW
Print_ISBN :
978-0-7695-3496-1
Type :
conf
DOI :
10.1109/WIIAT.2008.376
Filename :
4740647
Link To Document :
بازگشت