DocumentCode
1887856
Title
Dynamical System approach to insider threat detection
Author
Kanaskar, Nitin ; Bian, Jiang ; Seker, Remzi ; Nijim, Mais ; Yilmazer, Nuri
Author_Institution
Dept. of Comput. Sci., Univ. of Arkansas at Little Rock, Little Rock, AR, USA
fYear
2011
fDate
4-7 April 2011
Firstpage
232
Lastpage
238
Abstract
Insider attacks have the potential to inflict severe damage to an organizations reputation, intellectual property and financial assets. The primary difference between the external intrusions and the insider intrusions is that an insider wields power of knowledge about the information system resources, their environment, policies. We present an approach to detecting abnormal behavior of an insider by applying Dynamical System Theory to the insiders computer usage pattern. This is because abnormal system usage pattern is one of the necessary precursors to actual execution of an attack. A base profile of system usage pattern for an insider is created via applying dynamical system theory measures. A continuous monitoring of the insiders system usage and its comparison with this base profile is performed to identify considerable deviations. A sample system usage in terms of application system calls is collected, analyzed, and graphical results of the analysis are presented. Our results indicate that dynamical system theory has the potential of detecting suspicious insider behavior occurring prior to the actual attack execution.
Keywords
authorisation; abnormal system usage pattern; dynamical system approach; insider attacks; insider threat detection; insiders computer usage pattern; Delay; Entropy; Length measurement; Organizations; Size measurement; Time series analysis;
fLanguage
English
Publisher
ieee
Conference_Titel
Systems Conference (SysCon), 2011 IEEE International
Conference_Location
Montreal, QC
Print_ISBN
978-1-4244-9494-1
Type
conf
DOI
10.1109/SYSCON.2011.5929116
Filename
5929116
Link To Document