Volume 4 - Issue 4
Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection
- Philip Legg
Cyber Security Centre, Department of Computer Science, University of Oxford, UK
phil.legg@cs.ox.ac.uk
- Nick Moffat
Cyber Security Centre, Department of Computer Science, University of Oxford, UK
- Jason R.C. Nurse
Cyber Security Centre, Department of Computer Science, University of Oxford, UK
- Jassim Happa
Cyber Security Centre, Department of Computer Science, University of Oxford, UK
- Ioannis Agrafiotis
Cyber Security Centre, Department of Computer Science, University of Oxford, UK
- Michael Goldsmith
Cyber Security Centre, Department of Computer Science, University of Oxford, UK
- Sadie Creese
Cyber Security Centre, Department of Computer Science, University of Oxford, UK
Keywords: Insider Threat, Conceptual Model, Reasoning Structure
Abstract
The insider threat faced by corporations and governments today is a real and significant problem,
and one that has become increasingly difficult to combat as the years have progressed. From a technology
standpoint, traditional protective measures such as intrusion detection systems are largely
inadequate given the nature of the ‘insider’ and their legitimate access to prized organisational data
and assets. As a result, it is necessary to research and develop more sophisticated approaches for
the accurate recognition, detection and response to insider threats. One way in which this may be
achieved is by understanding the complete picture of why an insider may initiate an attack, and the
indicative elements along the attack chain. This includes the use of behavioural and psychological
observations about a potential malicious insider in addition to technological monitoring and profiling
techniques. In this paper, we propose a framework for modelling the insider-threat problem that
goes beyond traditional technological observations and incorporates a more complete view of insider
threats, common precursors, and human actions and behaviours. We present a conceptual model for
insider threat and a reasoning structure that allows an analyst to make or draw hypotheses regarding
a potential insider threat based on measurable states from real-world observations.