Insider threat modeling: An adversarial risk analysis approach

11/22/2019
by   Chaitanya Joshi, et al.
0

Insider threats entail major security issues in geopolitics, cyber risk management and business organization. The game theoretic models proposed so far do not take into account some important factors such as the organisational culture and whether the attacker was detected or not. They also fail to model the defensive mechanisms already put in place by an organisation to mitigate an insider attack. We propose two new models which incorporate these settings and hence are more realistic. adversarial risk analysis (ARA) approach to find the solution to our models. ARA does not assume common knowledge and solves the problem from the point of view of one of the players, taking into account their knowledge and uncertainties regarding the choices available to them, to their adversaries, the possible outcomes, their utilities and their opponents' utilities. Our models and the ARA solutions are general and can be applied to most insider threat scenarios. A data security example illustrates the discussion.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/16/2017

Uncertainty in Cyber Security Investments

When undertaking cyber security risk assessments, we must assign numeric...
research
02/21/2018

Adversarial classification: An adversarial risk analysis approach

Classification problems in security settings are usually contemplated as...
research
01/14/2018

Towards Realistic Threat Modeling: Attack Commodification, Irrelevant Vulnerabilities, and Unrealistic Assumptions

Current threat models typically consider all possible ways an attacker c...
research
04/18/2020

Protecting Classifiers From Attacks. A Bayesian Approach

Classification problems in security settings are usually modeled as conf...
research
06/07/2023

A GDPR-compliant Risk Management Approach based on Threat Modelling and ISO 27005

Computer systems process, store and transfer sensitive information which...
research
05/02/2022

Defending Against Advanced Persistent Threats using Game-Theory

Advanced persistent threats (APT) combine a variety of different attack ...
research
01/09/2019

Risk analysis beyond vulnerability and resilience - characterizing the defensibility of critical systems

A common problem in risk analysis is to characterize the overall securit...

Please sign up or login with your details

Forgot password? Click here to reset