A Thief among Us: The Use of Finite-State Machines to Dissect Insider Threat in Cloud Communications

Insider threats are both social and technological phenomena, and group dynamics can provide important indicators to help counter insider threats. This paper discusses an experimental study that simulates insider betrayal in an online collaborative environment. This study uses the framework of trustworthiness attribution, wherein the authors examine the trustworthiness of a focal individual whose role was in leadership with authority within a trusted team arrangement. Specifically, the authors adopted a finite-state machine (FSM) approach to analyzing patterns of a group's emotional states in order to understand how members collectively distinguish insider betrayal through computer-mediated interactions, social connectivity and coordination. Moreover, these conditions help us understand how human observations of betrayal can be leveraged to provide early warnings to betrayal. Of the four simulated case studies conducted, two provide baseline measures, and the other two provide treatment measures. Findings indicate that signs of potential betrayal can be collectively identified by team members through text and behavioral patterns – to uncover social intent that is not explicitly stated.

[1]  Fritz Heider,et al.  Social perception and phenomenal causality. , 1944 .

[2]  Luis von Ahn Games with a Purpose , 2006, Computer.

[3]  Adrian Furnham,et al.  Personality traits, types, and disorders: an examination of the relationship between three self‐report measures , 2005 .

[4]  E. S. Conklin Human Motivation , 1932, The Journal of Religion.

[5]  K. Scherer Criteria for emotion-antecedent appraisal: A review. , 1988 .

[6]  E. Eugene Schultz A framework for understanding and predicting insider attacks , 2002, Comput. Secur..

[7]  R. E. Christal,et al.  Recurrent personality factors based on trait ratings. , 1992, Journal of personality.

[8]  Nadia Magnenat-Thalmann,et al.  Generic personality and emotion simulation for conversational agents , 2004, Comput. Animat. Virtual Worlds.

[9]  F. Heider The psychology of interpersonal relations , 1958 .

[10]  E. Ostrom,et al.  Trust and reciprocity : interdisciplinary lessons from experimental research , 2003 .

[11]  P. Ekman Unmasking The Face , 1975 .

[12]  H. E. P. Cattell,et al.  The original big five : A historical perspective , 1996 .

[13]  Indrajit Ray,et al.  Using Attack Trees to Identify Malicious Attacks from Authorized Insiders , 2005, ESORICS.

[14]  David J. Pittenger,et al.  The limitations of extracting typologies from trait measures of personality , 2004 .

[15]  G. Bower,et al.  Cognitive perspectives on emotion and motivation , 1988 .

[16]  J. Asendorpf Head‐to‐head comparison of the predictive validity of personality types and dimensions , 2003 .

[17]  Alain Pinsonneault,et al.  Survey Research Methodology in Management Information Systems: An Assessment , 1993, J. Manag. Inf. Syst..

[18]  Shuyuan Mary Ho Behavioral anomaly detection: A socio-technical study of trustworthiness in virtual organizations , 2009 .

[19]  Elisabeth André,et al.  Exploiting emotions to disambiguate dialogue acts , 2004, IUI '04.

[20]  Magalie Ochs,et al.  Modeling the Dynamics of Non-Player Characters' Social Relations in Video Games , 2008, AIIDE.

[21]  S. Kaiser,et al.  Situated emotional problem solving in interactive computer games 1 , 1996 .

[22]  Kenneth L. Pike,et al.  Discourse Analysis and Tagmeme Matrices , 1964 .

[23]  L. R. Goldberg,et al.  The language of personality: Lexical perspectives on the five-factor model. , 1996 .

[24]  J. G. Holmes,et al.  An Atlas of Interpersonal Situations , 2003 .

[25]  Antonio Terracciano,et al.  Person‐factors in the California Adult Q‐Set: closing the door on personality trait types? , 2006 .

[26]  Donn B. Parker,et al.  Fighting computer crime - a new framework for protecting information , 1998 .

[27]  Manuel Blum,et al.  reCAPTCHA: Human-Based Character Recognition via Web Security Measures , 2008, Science.

[28]  P. Costa,et al.  Validation of the five-factor model of personality across instruments and observers. , 1987, Journal of personality and social psychology.

[29]  J. S. Wiggins,et al.  The five-factor model of personality : theoretical perspectives , 1996 .

[30]  Carla H. Lagorio,et al.  Psychology , 1929, Nature.

[31]  Shuyuan Mary Ho A Socio-Technical Approach to Understanding Perceptions of Trustworthiness in Virtual Organizations , 2009 .

[32]  William L. Simon,et al.  The Art of Deception: Controlling the Human Element of Security , 2001 .

[33]  I. Ajzen Attitudes, Personality and Behavior , 1988 .

[34]  Yi Zhu,et al.  Using finite state machines for evaluating spoken dialog systems , 2010, 2010 IEEE Spoken Language Technology Workshop.

[35]  Shuyuan Mary Ho Attribution-based Anomaly Detection: Trustworthiness in an Online Community , 2008 .