Insider risk profile matrix to quantify risk value of insider threat prediction framework
An insider threat refers to the threat arising from an individual inside an organization that maliciously leverages his or her system privileges, and closeness and proximity in a computerized environment to compromise valuable information and inflict harm. This scenario is an example of system viola...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Asian Research Publishing Network
2017
|
Online Access: | http://eprints.utm.my/id/eprint/76647/1/IszaidaIsmail2017_InsiderRiskProfileMatrixToQuantify.pdf http://eprints.utm.my/id/eprint/76647/ https://www.scopus.com/inward/record.uri?eid=2-s2.0-85031714406&partnerID=40&md5=009d5dbc4ba46463e7871242b169963f |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Teknologi Malaysia |
Language: | English |
id |
my.utm.76647 |
---|---|
record_format |
eprints |
spelling |
my.utm.766472018-10-14T08:37:24Z http://eprints.utm.my/id/eprint/76647/ Insider risk profile matrix to quantify risk value of insider threat prediction framework Ismail, I. Hassan, R. Othman, M. R. Ahmad, A. S. Tawfiq, N. E. An insider threat refers to the threat arising from an individual inside an organization that maliciously leverages his or her system privileges, and closeness and proximity in a computerized environment to compromise valuable information and inflict harm. This scenario is an example of system violation that decreases the degree of system trustworthiness. Most cases of system trustworthiness use a peer judgment formulation, which may involve bias sentiments towards document sensitivity values. Moreover, audit trails of risky document navigation paths are important as an alarm to indicate any violation. Therefore, this study presents a combination of the trust criteria and document sensitivity level of an insider to obtain a risk value, which will be used to predict the occurrence of an insider threat. This study begins by investigating the prominent attributes of insiders with a focus on their degree of experience and skill in line with system trust. Subsequently, these prominent attributes are used to construct an insider Trust Profile Matrix (TPM). From the TPM, the trust value is calculated and combined with the sensitivity value of each document to produce a Risk Matrix (RM). As a result, (i) risk value and (ii) prediction rate and risky path are then calculated and analyzed using an Insider Threat Prediction Framework as an alarm for violation occurrence. Asian Research Publishing Network 2017 Article PeerReviewed application/pdf en http://eprints.utm.my/id/eprint/76647/1/IszaidaIsmail2017_InsiderRiskProfileMatrixToQuantify.pdf Ismail, I. and Hassan, R. and Othman, M. R. and Ahmad, A. S. and Tawfiq, N. E. (2017) Insider risk profile matrix to quantify risk value of insider threat prediction framework. Journal of Theoretical and Applied Information Technology, 95 (19). pp. 5090-5103. ISSN 1992-8645 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85031714406&partnerID=40&md5=009d5dbc4ba46463e7871242b169963f |
institution |
Universiti Teknologi Malaysia |
building |
UTM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Malaysia |
content_source |
UTM Institutional Repository |
url_provider |
http://eprints.utm.my/ |
language |
English |
description |
An insider threat refers to the threat arising from an individual inside an organization that maliciously leverages his or her system privileges, and closeness and proximity in a computerized environment to compromise valuable information and inflict harm. This scenario is an example of system violation that decreases the degree of system trustworthiness. Most cases of system trustworthiness use a peer judgment formulation, which may involve bias sentiments towards document sensitivity values. Moreover, audit trails of risky document navigation paths are important as an alarm to indicate any violation. Therefore, this study presents a combination of the trust criteria and document sensitivity level of an insider to obtain a risk value, which will be used to predict the occurrence of an insider threat. This study begins by investigating the prominent attributes of insiders with a focus on their degree of experience and skill in line with system trust. Subsequently, these prominent attributes are used to construct an insider Trust Profile Matrix (TPM). From the TPM, the trust value is calculated and combined with the sensitivity value of each document to produce a Risk Matrix (RM). As a result, (i) risk value and (ii) prediction rate and risky path are then calculated and analyzed using an Insider Threat Prediction Framework as an alarm for violation occurrence. |
format |
Article |
author |
Ismail, I. Hassan, R. Othman, M. R. Ahmad, A. S. Tawfiq, N. E. |
spellingShingle |
Ismail, I. Hassan, R. Othman, M. R. Ahmad, A. S. Tawfiq, N. E. Insider risk profile matrix to quantify risk value of insider threat prediction framework |
author_facet |
Ismail, I. Hassan, R. Othman, M. R. Ahmad, A. S. Tawfiq, N. E. |
author_sort |
Ismail, I. |
title |
Insider risk profile matrix to quantify risk value of insider threat prediction framework |
title_short |
Insider risk profile matrix to quantify risk value of insider threat prediction framework |
title_full |
Insider risk profile matrix to quantify risk value of insider threat prediction framework |
title_fullStr |
Insider risk profile matrix to quantify risk value of insider threat prediction framework |
title_full_unstemmed |
Insider risk profile matrix to quantify risk value of insider threat prediction framework |
title_sort |
insider risk profile matrix to quantify risk value of insider threat prediction framework |
publisher |
Asian Research Publishing Network |
publishDate |
2017 |
url |
http://eprints.utm.my/id/eprint/76647/1/IszaidaIsmail2017_InsiderRiskProfileMatrixToQuantify.pdf http://eprints.utm.my/id/eprint/76647/ https://www.scopus.com/inward/record.uri?eid=2-s2.0-85031714406&partnerID=40&md5=009d5dbc4ba46463e7871242b169963f |
_version_ |
1643657370045251584 |