S. Kavun, O. Zavgorodnia, O. Panchenko, Robert Brumnik
{"title":"Counteracting Malicious Insider’s Activity within Funds Transfer Systems","authors":"S. Kavun, O. Zavgorodnia, O. Panchenko, Robert Brumnik","doi":"10.1109/PICST47496.2019.9061212","DOIUrl":null,"url":null,"abstract":"The developed classification characteristics of insiders on the level of access and classification characteristics of their actions allowed to formalize the mathematical apparatus for constructing an insider action model on the basis of the international standard of the IDEF0 functional modeling methodology, to generate input information for the created model, and also to perform the decomposition of the 1st and 2nd levels model. The model is based on the statement that usual insiders work on the same algorithms. The difference arises only due to the specific nature of the enterprise's activities. Based on the above algorithm of actions of insiders, a scheme of actions of insiders at the enterprise was developed.","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"17 1","pages":"169-174"},"PeriodicalIF":0.0000,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PICST47496.2019.9061212","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The developed classification characteristics of insiders on the level of access and classification characteristics of their actions allowed to formalize the mathematical apparatus for constructing an insider action model on the basis of the international standard of the IDEF0 functional modeling methodology, to generate input information for the created model, and also to perform the decomposition of the 1st and 2nd levels model. The model is based on the statement that usual insiders work on the same algorithms. The difference arises only due to the specific nature of the enterprise's activities. Based on the above algorithm of actions of insiders, a scheme of actions of insiders at the enterprise was developed.