2011
DOI: 10.5038/1944-0472.4.2.2
|View full text |Cite
|
Sign up to set email alerts
|

Modeling Human Behavior to Anticipate Insider Attacks

Abstract: human factors and social/behavioral science challenges through modeling and advanced engineering/computing approaches. This research focuses on the intelligence domain, including human behavior modeling with application to identifying/predicting malicious insider cyber activities, modeling socio-cultural factors as predictors of terrorist activities, and human information interaction concepts for enhancing intelligence analysis decision making. Dr. Greitzer's research interests also include evaluation methods … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
54
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 82 publications
(69 citation statements)
references
References 15 publications
0
54
0
Order By: Relevance
“…Greitzer et al [30,31] discuss the use of psychological factors for identifying potential insider threats. They propose a Bayesian Network model that consists of a variety of binary observable behaviours (e.g., engagement, accepting criticism, confrontation, performance, stress, absenteeism).…”
Section: State Of the Art In Researchmentioning
confidence: 99%
“…Greitzer et al [30,31] discuss the use of psychological factors for identifying potential insider threats. They propose a Bayesian Network model that consists of a variety of binary observable behaviours (e.g., engagement, accepting criticism, confrontation, performance, stress, absenteeism).…”
Section: State Of the Art In Researchmentioning
confidence: 99%
“…For example, when the logs history show the user login into system with abnormal from actual, the user profiling method can be used to observe user behaviour and forecast possible threats. Greitzer and Hohimer [40] added that incorporating psychosocial (mental problem, espionage, disgruntlement) data along with cyber data (user behaviour activities) into the behavioural analysis that offers an additional dimension to assess potential threats.…”
Section: Mitigation Strategies For Information Leakagementioning
confidence: 99%
“…The topic of an insider's psychology has received substantial research and practitioner emphasis over the last few years (e.g., [3,19,31]), after being somewhat overlooked in early enterprise-security work. Based on our research into these articles and the collected case data, we identify eight elements that may be especially useful in modelling and analysing this aspect of insider threats.…”
Section: A Understanding the Propensity To Attackmentioning
confidence: 99%