Analysis of insider behavior in an information system under the influence of an invader

Автор: Karpova N.E, Saranskaya A.A.

Журнал: Инфокоммуникационные технологии @ikt-psuti

Рубрика: Новые информационные технологии

Статья в выпуске: 1 (89) т.23, 2025 года.

Бесплатный доступ

The article is addressed to the study of insider behavior in an information system under the influence of an invader. One of the most serious types of threats is the interaction of external intruders with employees. Insiders, as a part of an organization, have access to critical data and systems, making them an attractive target for intruders. To effectively counter such threats, a structured understanding of the processes that underlie the interaction of an intruder and an insider is necessary. The article describes methods of invader’s influence on an insider. The motivation of an insider, which can be used by an attacker to achieve goals, is analyzed. Based on the analysis, a semantic network was compiled describing the interaction of an insider and an intruder. Based on these descriptions, a Petri net was developed in order to create a model of the interaction of an intruder, an insider, and an information system.

Еще

Information security, user behavior, insider, attacker, Petri nets, semantic network, threats

Короткий адрес: https://sciup.org/140312329

IDR: 140312329   |   УДК: 004.891.1   |   DOI: 10.18469/ikt.2025.23.1.07