J4 ›› 2014, Vol. 41 ›› Issue (1): 110-115.doi: 10.3969/j.issn.1001-2400.2014.01.020

• Original Articles • Previous Articles     Next Articles

Sensing insider threat based on access vectors

ZHANG Hongbin1;PEI Qingqi2;WANG Chao2;WANG Meihua1   

  1. (1. Institute of Information Science & Engineering, Hebei Univ. of Science and Technology, Shijiazhuang  050018,China;
    2. State Key Lab. of Integrated Service Networks, Xidian Univ., Xi'an  710071,China)
  • Received:2012-11-07 Online:2014-02-20 Published:2014-04-02
  • Contact: ZHANG Hongbin E-mail:hbzhang@live.com

Abstract:

The hierarchy-based access control model and access vectors are defined by using the access control relationship. A method is developed for quantizing the insider threat on resources and actions in the information system. Then a full real time assessment is obtained by using access vectors. Compared with other models, this model improves the precision and objectivity of the quantization without a prior knowledge of the system. Experimental results show that the access vector based on the hand hierarchy-based access control model can effectively assess the insider threat in real-time and can be used to build the insider threat sense system.

Key words: insider threat, assessment, access control, vector

CLC Number: 

  • TP309.2