• DocumentCode
    2336865
  • Title

    Performance analysis of an insider threat mitigation model

  • Author

    Althebyan, Qutaibah ; Panda, Brajendra

  • Author_Institution
    Univ. of Arkansas, Fayetteville, AR
  • fYear
    2008
  • fDate
    13-16 Nov. 2008
  • Firstpage
    703
  • Lastpage
    709
  • Abstract
    In this work, we presented an approach to extract knowledge out of an object. A graph theory approach to represent and manage the knowledge is explained. We then presented a performance analysis for an insider threat mitigation model proposed earlier. We relied on some characteristics of the insiders and the decomposition of objects in the underlying system in developing our method and conducting our simulation. Our modelpsilas results showed great resistance against such attacks.
  • Keywords
    graph theory; knowledge acquisition; security of data; graph theory; insider threat mitigation model; knowledge extraction; performance analysis; Computational modeling; Computer crime; Graph theory; Humans; Information systems; Information technology; Knowledge management; Performance analysis; Performance evaluation; Security;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Digital Information Management, 2008. ICDIM 2008. Third International Conference on
  • Conference_Location
    London
  • Print_ISBN
    978-1-4244-2916-5
  • Electronic_ISBN
    978-1-4244-2917-2
  • Type

    conf

  • DOI
    10.1109/ICDIM.2008.4746709
  • Filename
    4746709