Applying role based access control and genetic algorithms to insider threat detection

  • Authors:
  • Ning Hu;Phillip G. Bradford;Jun Liu

  • Affiliations:
  • The University of Alabama, Tuscaloosa, Alabama;The University of Alabama, Tuscaloosa, Alabama;The University of Alabama, Tuscaloosa, Alabama

  • Venue:
  • Proceedings of the 44th annual Southeast regional conference
  • Year:
  • 2006

Quantified Score

Hi-index 0.03

Visualization

Abstract

An insider threat is caused by authorized users potentially performing unsanctioned or inappropriate actions that endanger the computer security of an organization. This paper describes a novel approach that employs the ideas of Role-Based Access Control (RBAC) to initiate role-action mapping rules in line with organization specific security policies. These rules can be refined by genetic algorithms (GAs) to identify discrepancies between user roles and processes.