A knowledge-based bayesian model for analyzing a system after an insider attack

12Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Many consider insider attacks to be more severe than outsider attacks due to the nature of such attacks that involve people who have knowledge of their own organization. In this work, we presented a new model to evaluate and analyze a system after the occurrence of an insider attack. By evaluating and analyzing the system after detecting such attack, we classified systems' objects into a list of non affected objects and a list of affected objects. We also introduced a new graph called knowledge Bayesian attack graph (KBAG). KBAG represents possible candidate paths that malicious insiders may follow to achieve their goal of compromising critical objects. KBAG also enables us to calculate risk values for different objects using Bayesian inference techniques. These risk values will be considered as measurements for the likelihood of possible occurrence of other insider attacks that have not yet been detected by the underlying system. © 2008 Springer Science+Business Media, LLC.

Cite

CITATION STYLE

APA

Althebyan, Q., & Panda, B. (2008). A knowledge-based bayesian model for analyzing a system after an insider attack. In IFIP International Federation for Information Processing (Vol. 278, pp. 557–571). Springer New York. https://doi.org/10.1007/978-0-387-09699-5_36

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free