You are here

Developing an Insider Threat Experimental Environment

Download pdf | Full Screen View

Date Issued:
2017
Abstract/Description:
Simulated, 3D gaming environments have been used for a wide-range of applications including training, entertainment, and experimentation in an assortment of domains for some time. This can be attributed to their unique ability to emulate multifaceted situations that may be difficult to control, while affording participants the opportunity to operate in a relatively safe environment. In cybersecurity research, investigation of insider threat behavior is an endeavor that has received little attention in terms of available environments and resources for experimental manipulation. This research effort aimed to close this gap. A simulated, 3D gaming environment and accompanying scenarios were developed for utilization as a research application for a verification study. These constitute crucial components for proper development of insider threat detection tools and training applications. The aim was to use knowledge of performance, user stress state, and user perceptions of the simulation's graphic and usability qualities to verify the simulation for use in insider threat detection work. The objective of this simulated, 3D gaming environment and scenarios was to serve as a realistic and valid context for the development of insider threat identification methods. The scenario narrative involved a reenactment of computer system exploitation by an employee who is trying to acquire private financial information without authorization. In each scenario, the participant assumed the role of a financial investigator employed at a large financial institution. There were two conditions associated with this verification study (control and insider threat). Participants in the control condition performed all of their tasking as regular bank employees while participants assigned to the insider threat condition had to carry out a portion of their tasking as an insider threat.Findings indicated that participants found the simulated, 3D gaming environment engaging, and the simulations graphics usable and immersive. Additionally, the role manipulation resulted in a significant difference in the time it took to perform critical tasking (tasking that was illicit in the insider threat condition). Role manipulation did not produce significant differences in stress between conditions, but it was influential regarding the perceptions of the stress sources. The results suggest that this simulated, 3D gaming environment meets the needs of insider threat investigation and can be used to advance understanding of the nature of insider threat behavior.
Title: Developing an Insider Threat Experimental Environment.
20 views
10 downloads
Name(s): Ortiz, Eric, Author
Reinerman, Lauren, Committee Chair
Matthews, Gerald, Committee Member
Fanfarelli, Joseph, Committee Member
Nicholson, Denise, Committee Member
University of Central Florida, Degree Grantor
Type of Resource: text
Date Issued: 2017
Publisher: University of Central Florida
Language(s): English
Abstract/Description: Simulated, 3D gaming environments have been used for a wide-range of applications including training, entertainment, and experimentation in an assortment of domains for some time. This can be attributed to their unique ability to emulate multifaceted situations that may be difficult to control, while affording participants the opportunity to operate in a relatively safe environment. In cybersecurity research, investigation of insider threat behavior is an endeavor that has received little attention in terms of available environments and resources for experimental manipulation. This research effort aimed to close this gap. A simulated, 3D gaming environment and accompanying scenarios were developed for utilization as a research application for a verification study. These constitute crucial components for proper development of insider threat detection tools and training applications. The aim was to use knowledge of performance, user stress state, and user perceptions of the simulation's graphic and usability qualities to verify the simulation for use in insider threat detection work. The objective of this simulated, 3D gaming environment and scenarios was to serve as a realistic and valid context for the development of insider threat identification methods. The scenario narrative involved a reenactment of computer system exploitation by an employee who is trying to acquire private financial information without authorization. In each scenario, the participant assumed the role of a financial investigator employed at a large financial institution. There were two conditions associated with this verification study (control and insider threat). Participants in the control condition performed all of their tasking as regular bank employees while participants assigned to the insider threat condition had to carry out a portion of their tasking as an insider threat.Findings indicated that participants found the simulated, 3D gaming environment engaging, and the simulations graphics usable and immersive. Additionally, the role manipulation resulted in a significant difference in the time it took to perform critical tasking (tasking that was illicit in the insider threat condition). Role manipulation did not produce significant differences in stress between conditions, but it was influential regarding the perceptions of the stress sources. The results suggest that this simulated, 3D gaming environment meets the needs of insider threat investigation and can be used to advance understanding of the nature of insider threat behavior.
Identifier: CFE0007131 (IID), ucf:52309 (fedora)
Note(s): 2017-08-01
Ph.D.
Engineering and Computer Science, Dean's Office GRDST
Doctoral
This record was generated from author submitted information.
Subject(s): Cybersecurity -- Insider Threat -- Gaming Environment -- 3D
Persistent Link to This Record: http://purl.flvc.org/ucf/fd/CFE0007131
Restrictions on Access: campus 2023-02-15
Host Institution: UCF

In Collections