The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
IFIP — The International Federation for Information Processing
DOI: 10.1007/978-0-387-73742-3_4
|View full text |Cite
|
Sign up to set email alerts
|

Insider Threat Analysis Using Information-Centric Modeling

Abstract: Capability acquisition graphs (CAGs) provide a powerful framework for modeling insider threats, network attacks and system vulnerabilities. However, CAG-based security modeling systems have yet to be deployed in practice. This paper demonstrates the feasibility of applying CAGs to insider threat analysis. In particular, it describes the design and operation of an information-centric, graphics-oriented tool called ICMAP. ICMAP enables an analyst without any theoretical background to apply CAGs to answer securit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(11 citation statements)
references
References 12 publications
0
11
0
Order By: Relevance
“…Butts extends the Schematic Protection Model to produce the first comprehensive security model capable of analyzing the safety of a system against the insider threat [13]. Ha et al demonstrate the feasibility of applying capability acquisition graphs to insider threat analysis [14]. Ali et al present an Agent-based User-Profiling model that monitors the behavior of the authorized users in an organization to avoid risk [15].…”
Section: Related Workmentioning
confidence: 99%
“…Butts extends the Schematic Protection Model to produce the first comprehensive security model capable of analyzing the safety of a system against the insider threat [13]. Ha et al demonstrate the feasibility of applying capability acquisition graphs to insider threat analysis [14]. Ali et al present an Agent-based User-Profiling model that monitors the behavior of the authorized users in an organization to avoid risk [15].…”
Section: Related Workmentioning
confidence: 99%
“…It means that the credential for a host h1 gives the attacker access to host h2 as well, if these two hosts trust each other. Therefore, the real-life situation that my password gives someone Ha, Chinchani et al [12,7] propose a type of graph which allows not only the modelling but also the simulation of an attacker searching through the graph. Nodes are associated with tokens and edges associated with minimum and maximum costs.…”
Section: Related Workmentioning
confidence: 99%
“…Chinchani et al [38,87], from Buffalo University, proposed a target-centric approach which allows not only the modelling but also the simulation of an attacker searching through the graph. Nodes are associated with tokens, e.g.…”
Section: Optimization Perspective Of Attack Graphsmentioning
confidence: 99%
“…We neglect this aspect because, in our view, it is attackerspecific and difficult to generalize. Other researchers [87], mentioned in Section 2.2.3.4 on page 34, rely on complicated schemes to assign cost based on several attributes of vulnerabilities, attackers and attacks. Again, they do not scale, are stakeholder-specific and subjective.…”
Section: Cost Of Attack Stepmentioning
confidence: 99%