Title :
Intelligence Analyses and the Insider Threat
Author :
Santos, Eugene, Jr. ; Nguyen, Hien ; Yu, Fei ; Kim, Keum Joo ; Li, Deqing ; Wilkinson, John T. ; Olson, Adam ; Russell, Jacob ; Clark, Brittany
Author_Institution :
Thayer Sch. of Eng., Dartmouth Coll., Hanover, NH, USA
fDate :
3/1/2012 12:00:00 AM
Abstract :
In the intelligence community, the existence of a malicious insider poses a severe threat to information, to the actual analytic process, and, ultimately, to any decision-making process relying on such information and analyses. An analyst with malicious intent can create irreversible short-term, as well as long-term, damage that is hard to detect. In this paper, we propose a novel methodology that detects malicious analysts who attempt to manipulate decision makers´ perceptions through their intelligence reports. This detection method relies on each analyst´s working style, which we assume to be consistent from task to task. In order to measure an analyst´s degree of consistency, we employ a user-modeling technique that automatically builds a computational model of each analyst based on observation of their activities. We hypothesize that inconsistency is mainly caused by malicious actions. Therefore, the detection method evaluates how consistent an analyst is across different tasks and raises an alert if any significantly large inconsistency is detected. A normalization procedure is employed which allows us to compare across a group of analysts and is shown to reduce noise and amplify inconsistency that is due to malicious actions. We show that this improves detection performance. Our experiments demonstrate the effectiveness of our approach in detecting malicious insiders. In the experiments, the percentage of malicious insiders grouped with legitimate ones is varied, and results are collected with and without normalization in order to provide a comprehensive analysis of our approach.
Keywords :
decision making; security of data; analyst inconsistency detection; decision-making process; information threat; insider threat; intelligence analyses; intelligence community; malicious actions; malicious analysts detection; malicious insider detection; malicious intent; user-modeling technique; Analytical models; Context; Correlation; Feature extraction; Integrated circuits; Organizations; Psychology; Cognitive styles; decision-making process; insider threat; intelligence analyses;
Journal_Title :
Systems, Man and Cybernetics, Part A: Systems and Humans, IEEE Transactions on
DOI :
10.1109/TSMCA.2011.2162500