Insider Threat Analysis Using Information-Centric Modeling

  title={Insider Threat Analysis Using Information-Centric Modeling},
  author={Duc T. Ha and Shambhu J. Upadhyaya and Hung Q. Ngo and Suranjan Pramanik and Ramkumar Chinchani and Sunu Mathew},
  booktitle={IFIP Int. Conf. Digital Forensics},
Capability acquisition graphs (CAGs) provide a powerful framework for modeling insider threats, network attacks and system vulnerabilities. However, CAG-based security modeling systems have yet to be deployed in practice. This paper demonstrates the feasibility of applying CAGs to insider threat analysis. In particular, it describes the design and operation of an information-centric, graphics-oriented tool called ICMAP. ICMAP enables an analyst without any theoretical background to apply CAGs… CONTINUE READING
Highly Cited
This paper has 25 citations. REVIEW CITATIONS


Publications citing this paper.
Showing 1-10 of 20 extracted citations


Publications referenced by this paper.
Showing 1-10 of 14 references

Automated Generation and Analysis of Attack Graphs

IEEE Symposium on Security and Privacy • 2002
View 4 Excerpts
Highly Influenced

Towards a theory of insider threat assessment

2005 International Conference on Dependable Systems and Networks (DSN'05) • 2005
View 4 Excerpts


P. Ammann, D. Wijesekera, S. Kaushik
graph-based network vulnerability analysis, Proceedings of the Ninth ACM Conference on Computer and Communications Security, pp. 217–224 • 2002
View 1 Excerpt

Computer-attack graph generation tool

L. Swiler, C. Phillips, D. Ellis, S. Chakerian
Proceedings of the DARPA Information Survivability Conference and Exposition, vol. 2, pp. 307–321 • 2001
View 2 Excerpts

Similar Papers

Loading similar papers…