Research Commons
      • Browse 
        • Communities & Collections
        • Titles
        • Authors
        • By Issue Date
        • Subjects
        • Types
        • Series
      • Help 
        • About
        • Collection Policy
        • OA Mandate Guidelines
        • Guidelines FAQ
        • Contact Us
      • My Account 
        • Sign In
        • Register
      View Item 
      •   Research Commons
      • University of Waikato Research
      • Computing and Mathematical Sciences
      • Computing and Mathematical Sciences Papers
      • View Item
      •   Research Commons
      • University of Waikato Research
      • Computing and Mathematical Sciences
      • Computing and Mathematical Sciences Papers
      • View Item
      JavaScript is disabled for your browser. Some features of this site may not work without it.

      Insider threat modeling: An adversarial risk analysis approach

      Joshi, Chaitanya; Rios Insua, David; Rios, Jesus
      Thumbnail
      Files
      Chaitanya Joshi talk.pdf
      Submitted version, 3.470Mb
      Joshi_Rios_Rios_ARA_Insider threat_Submitted 14Feb19.pdf
      Submitted version, 408.0Kb
      Citation
      Export citation
      Joshi, C., Rios Insua, D., & Rios, J. (2019). Insider threat modeling: An adversarial risk analysis approach. Presented at the Sixth Symposium on Games and Decisions in Reliability and Risk, George Washington University, Washington DC, USA.
      Permanent Research Commons link: https://hdl.handle.net/10289/12716
      Abstract
      Insider threats entail major security issues in geopolitics, cyber security and business organizations. Most earlier work in the field has focused on standard game theoretic approaches. We provide here two alternative, more realistic models based on adversarial risk analysis (ARA). ARA does not assume common knowledge and solves the problem from the point of view of just one of the players, the defender (typically), taking into account their knowledge and uncertainties regarding the choices available to them, to their adversaries, the possible outcomes, their payoffs/utilities and their opponents payoffs/utilities. The first model depicts the problem as a standard Defend-AttackDefend model. The second model segments the set of involved agents in three classes of users and considers both sequential as well as simultaneous actions. A data security example illustrates the discussion.
      Date
      2019
      Type
      Conference Contribution
      Rights
      © 2019 copyright with the authors.
      Collections
      • Computing and Mathematical Sciences Papers [1455]
      Show full item record  

      Usage

      Downloads, last 12 months
      142
       
       

      Usage Statistics

      For this itemFor all of Research Commons

      The University of Waikato - Te Whare Wānanga o WaikatoFeedback and RequestsCopyright and Legal Statement