Information behaving badly

  • Authors:
  • Julie Boxwell Ard;Matt Bishop;Carrie Gates;Michael Xin Sun

  • Affiliations:
  • University of California at Davis, Davis, CA, USA;University of California at Davis, Davis, CA, USA;CA Labs, New York, NY, USA;University of California at Davis, Davis, CA, USA

  • Venue:
  • Proceedings of the 2013 workshop on New security paradigms workshop
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

Traditionally, insider threat detection has focused on observing human actors -- or, more precisely, computer accounts and processes acting on behalf of those actors -- to model their "normal" behavior, then determine if they have performed some anomalous action and, further, if that action is malicious. In this paper, we shift the paradigm from observing human behavior to observing information behavior by modeling how documents flow through an organization. We hypothesize that similar types of documents will exhibit similar workflows, and that a document deviating from its expected workflow indicates potential data leakage.