A Thief among Us: The Use of Finite-State Machines to

Dissect Insider Threat in Cloud Communications

 

Shuyuan Mary Ho1 and Hwajung Lee2

 

1Florida State University

Tallahassee, FL 32306-2100

smho@fsu.edu

 

2Radford University

Radford, VA 24142. USA

hlee3@radford.edu

 

 

Abstract

 

Insider threats are both social and technological phenomena, and group dynamics can provide important

indicators to help counter insider threats. This paper discusses an experimental study that simulates insider

betrayal in an online collaborative environment. This study uses the framework of trustworthiness attribution,

wherein the authors examine the trustworthiness of a focal individual whose role was in leadership with authority

within a trusted team arrangement. Specifically, the authors adopted a finite-state machine (FSM) approach to

analyzing patterns of a group's emotional states in order to understand how members collectively distinguish

insider betrayal through computer-mediated interactions, social connectivity and coordination. Moreover, these

conditions help us understand how human observations of betrayal can be leveraged to provide early warnings to

betrayal. Of the four simulated case studies conducted, two provide baseline measures, and the other two provide

treatment measures. Findings indicate that signs of potential betrayal can be collectively identified by team

members through text and behavioral patterns – to uncover social intent that is not explicitly stated.

 

Keywords: Insider threats, information systems security, socio-technical system, online game simulation,
human computer interactions

 

Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA),

Vol. 3, No. 1/2, pp. 82-98, March 2012 [pdf]