Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
119 tokens/sec
GPT-4o
56 tokens/sec
Gemini 2.5 Pro Pro
43 tokens/sec
o3 Pro
6 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

The Danger Within: Insider Threat Modeling Using Business Process Models (2406.01135v2)

Published 3 Jun 2024 in cs.CR

Abstract: Threat modeling has been successfully applied to model technical threats within information systems. However, a lack of methods focusing on non-technical assets and their representation can be observed in theory and practice. Following the voices of industry practitioners, this paper explored how to model insider threats based on business process models. Hence, this study developed a novel insider threat knowledge base and a threat modeling application that leverages Business Process Modeling and Notation (BPMN). Finally, to understand how well the theoretic knowledge and its prototype translate into practice, the study conducted a real-world case study of an IT provider's business process and an experimental deployment for a real voting process. The results indicate that even without annotation, BPMN diagrams can be leveraged to automatically identify insider threats in an organization.

User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (4)
  1. Jan von der Assen (17 papers)
  2. Jasmin Hochuli (1 paper)
  3. Burkhard Stiller (39 papers)
  4. Thomas GrĂ¼bl (3 papers)

Summary

We haven't generated a summary for this paper yet.