J4

• Original Articles • Previous Articles     Next Articles

Method for building the real time insider threat model

ZHANG Hong-bin1,2;PEI Qing-qi1;MA Jian-feng1
  

  1. (1. Ministry of Education Key Lab. of Computer Network and Information Security, Xidian Univ., Xi’an 710071, China;
    2. Inst. of Information Sci. & Eng., Hebei Univ. of Sci. and Tech., Shijiazhuang 050054, China)
  • Received:2008-05-16 Revised:1900-01-01 Online:2009-02-20 Published:2009-02-10
  • Contact: ZHANG Hong-bin E-mail:hunter@china.com

Abstract: Partial orders of subjects and of objects in the system and mapping relationship between them are defined by using the access control relationship. On this basis, a hierarchy-mapping based insider threat model is developed. The analytic hierarchy process is used to decompose and quantify the insider threat features of subjects and objects in the model. Then full real time assessment is obtained by using the mapping between subjects and objects. Compared with other models, this model improves the precision and objectivity of the quantization by the combination of qualitative and quantitative analysis. Experimental results show that the hierarchy-mapping based insider threat model can effectively assess the insider threat in real-time and can be used to build the insider threat sense system.

Key words: mapping, insider threat, assessment, subject, object

CLC Number: 

  • TN915.04