Counteracting Malicious Insider’s Activity within Funds Transfer Systems

The developed classification characteristics of insiders on the level of access and classification characteristics of their actions allowed to formalize the mathematical apparatus for constructing an insider action model on the basis of the international standard of the IDEF0 functional modeling methodology, to generate input information for the created model, and also to perform the decomposition of the 1st and 2nd levels model. The model is based on the statement that usual insiders work on the same algorithms. The difference arises only due to the specific nature of the enterprise's activities. Based on the above algorithm of actions of insiders, a scheme of actions of insiders at the enterprise was developed.

[1]  S. Kavun,et al.  Influence Determination of Social Responsibility to the Productivity Enterprise Activity Level , 2016 .

[2]  B. Peterson Red Flags and Black Markets: Trends in Financial Crime and the Global Banking Response , 2013 .

[3]  M. Williams,et al.  Under the Corporate Radar: Examining Insider Business Cybercrime Victimization through an Application of Routine Activities Theory , 2019 .

[4]  Sergii Kavun,et al.  Complex systems modeling with intelligent control elements , 2017, Int. J. Model. Simul. Sci. Comput..

[5]  Lawrence B. Holder,et al.  Graph-based approaches to insider threat detection , 2009, CSIIRW '09.

[6]  Dawn M. Cappelli,et al.  The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes , 2012 .

[7]  Joseph E. Finnerty Insiders' Activity and Inside Information: A Multivariate Analysis , 1976, Journal of Financial and Quantitative Analysis.

[8]  Sergii Kavun,et al.  Techniques for Performance Improvement of Integer Multiplication in Cryptographic Applications , 2014 .

[9]  Steven Furnell,et al.  Insider Threat Prediction Tool: Evaluating the probability of IT misuse , 2002, Comput. Secur..

[10]  Ioanna Kantzavelou,et al.  A game-based intrusion detection mechanism to confront internal attackers , 2010, Comput. Secur..

[11]  Mykola Holovatyi The state and society: the conceptual foundations and social interaction in the context of formation and functioning of states , 2015 .

[12]  Sergii Kavun Conceptual fundamentals of a theory of mathematical interpretation , 2015, Int. J. Comput. Sci. Math..

[13]  Mingtian Zhou,et al.  Cyber Insider Threats Situation Awareness Using Game Theory and Information Fusion-based User Behavior Predicting Algorithm , 2011 .

[14]  A. A. Kuznetsov,et al.  THE STATISTICAL ANALYSIS OF A NETWORK TRAFFIC FOR THE INTRUSION DETECTION AND PREVENTION SYSTEMS , 2015 .

[15]  David P. Williamson,et al.  An Experimental Evaluation of the Best-of-Many Christofides’ Algorithm for the Traveling Salesman Problem , 2015, Algorithmica.

[16]  Yoav Shoham,et al.  Computer science and game theory , 2008, CACM.

[17]  Dawn M. Cappelli,et al.  Common Sense Guide to Mitigating Insider Threats 4th Edition , 2012 .

[18]  Sergii Kavun,et al.  Intelligent management of the enterprise personnel security system , 2018, 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT).

[19]  V. Kalashnikov,et al.  Enterprise Insider Detection as an Integer Programming Problem , 2012 .

[20]  Robert,et al.  Information Technology in Domain of Electronic Intelligence and Cyberterrorism Combat , 2015 .

[21]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[22]  Sergii Kavun Indicative-geometric method for estimation of any business entity , 2016, Int. J. Data Anal. Tech. Strateg..

[23]  Joseph D. Piotroski,et al.  The Influence of Analysts, Institutional Investors, and Insiders on the Incorporation of Market, Industry, and Firm-Specific Information into Stock Prices , 2004 .