Top Banner
The Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Attempts on IS Applications In a Financial Institution* Jingguo Wang 1 , Zhe (Jay) Shan 2 , Manish Gupta 3 and H.Raghav Rao 4 1 College of Business, University of Texas at Arlington 2 Lindner College of Business, University of Cincinnati 3 School of Management, State University of New York at Buffalo 4 University of Texas at San Antonio Presented at IFSA, University of Delaware, March 18, 2016 Acks: This research has been funded by the NSF under grants SES 1420758 and 1419856. The usual disclaimer applies.
46

Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Attempts on IS Applications in a Financial Institution

Jan 22, 2017

Download

Economy & Finance

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Attempts on IS Applications in a Financial Institution

The Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Attempts on IS Applications In a Financial Institution*

Jingguo Wang1, Zhe (Jay) Shan2, Manish Gupta3 and H.Raghav Rao4

1 College of Business, University of Texas at Arlington2 Lindner College of Business, University of Cincinnati

3 School of Management, State University of New York at Buffalo4 University of Texas at San Antonio

Presented at IFSA, University of Delaware, March 18, 2016Acks: This research has been funded by the NSF under grants SES 1420758 and 1419856. The usual disclaimer applies.

Page 2: Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Attempts on IS Applications in a Financial Institution

2

Agenda

• Introduction• Theory and hypothesis development

• Criminal opportunity theory• Hypothesis development

• Data and measurement• Data analysis and results• Discussion• Implications

Page 3: Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Attempts on IS Applications in a Financial Institution

3

Introduction

89% 55% of the organizations believed suggested privileged users they are at risk from insider attacks posed the biggest threat to

corporate data Source – 2015 Vormetric insider threat report

Insider threats impose significant threats to organizations’ digital assets

Page 4: Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Attempts on IS Applications in a Financial Institution

4

Introduction contd.• Studies in behavior information security have revolved around individual

motivation in one or more of its many forms that drive insiders’ behavior• Neutralization• Moral beliefs• Perceived identity match• Perceived risk of shame• Moral reasoning

• However, it is unclear under what kind of circumstances do insider threats to digital assets emerge

Page 5: Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Attempts on IS Applications in a Financial Institution

5

Criminal opportunity theory

• Criminal opportunity that arises in an environment, is often assumed to be a necessary (if not sufficient) condition of crime

• For a crime to occur:• There must be a motived offender (i.e., someone ready to offend) • The person must have the opportunity to commit the crime

• The theory seeks to explain properties of criminal acts as a function of circumstantial determinants created by the temporal and spatial convergence of motivated offenders and suitable targets in the absence of capable guardians.

Page 6: Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Attempts on IS Applications in a Financial Institution

6

Criminal opportunity theory contd.

• Criminal opportunity of varying size with the supply of suitable targets and ineffective guardianship:

Page 7: Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Attempts on IS Applications in a Financial Institution

7

Criminal opportunity theory contd.The amount of convergence may vary with from places to places, even with the same supply of motivated offenders, suitable targets, and ineffective guardianship:

Page 8: Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Attempts on IS Applications in a Financial Institution

8

Research model & hypotheses

• To mitigate and address the risk of insider threats, understanding the relationship between insiders and the crime situations during the perpetration of insider attacks is important

Page 9: Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Attempts on IS Applications in a Financial Institution

9

Hypothesis 1

H1: Off-hour accesses are positively associated with unauthorized access attempts

Page 10: Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Attempts on IS Applications in a Financial Institution

10

Hypothesis 1 contd.

• Insider crimes are usually conducted slowly (tempo) and repeatedly (rhythm) to avoid notice

• Off hour access to systems gives them the opportunity to reduce the effectiveness of detective controls.

• Off hour access allows them to attempt elevation of privileges and expansion of controls

Page 11: Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Attempts on IS Applications in a Financial Institution

11

Hypothesis 2

H2: Off-site accesses are positively associated with unauthorized access attempts

Page 12: Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Attempts on IS Applications in a Financial Institution

12

Hypothesis 2 contd.

• The location of individuals or objects affects their accessibility to people and traffic, and thereby affect motivation to criminal behavior

• Moreover, ineffective control or guardianship is a necessary component of a criminal opportunity context

• Nowadays, more and more companies allow their workforces to telecommute or use mobile technologies to remotely access enterprise information systems

Page 13: Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Attempts on IS Applications in a Financial Institution

13

Hypothesis 3

H3: The interaction between off-time and off-site access is positively associated with unauthorized access

attempts

Page 14: Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Attempts on IS Applications in a Financial Institution

14

Hypothesis 3 contd.

• Routine activity theory suggests that for a crime to occur, a motivated offender must converge in time and space with a suitable target in the absence of capable guardianship

• The likelihood that these conditions will be met is influenced by the routine activity patterns of potential offenders, victims, and guardians in society

• Off-time and off-site access aggregates criminal opportunities, and gives insider a guardian-free environment  to conduct prolonged malicious activities.

Page 15: Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Attempts on IS Applications in a Financial Institution

15

Hypothesis 4

H4: IS application exposure is positively associated with unauthorized access attempts

Page 16: Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Attempts on IS Applications in a Financial Institution

16

Hypothesis 4 contd.

• Target vulnerability at the environmental level aggregates across individuals and objects that are susceptible to criminal events

• The more proximate and exposed to a concentration of suitable targets, the more likely an individual or object will experience a criminal event

• Access to a higher number of applications is also typically symptomatic of “access creep”

• The 2008 incident, at Societe Generale which resulted in more than $7 billion in trading losses, was the result of an insider using access from his old role

Page 17: Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Attempts on IS Applications in a Financial Institution

17

Hypothesis 5

H5a: Employees from a larger department are associated with higher unauthorized attempts

H5b,c,d: Department size reinforces the effect of other variables in unauthorized access

attempts

Page 18: Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Attempts on IS Applications in a Financial Institution

18

Hypothesis 5 contd.

• An organization is vulnerable to various forms of computer crime, because dishonest employees perceive the organizational context as ‘criminogenic environments’

• Usually, a large department may have a low degree of manager supervision and safeguard controls

• It leads to a bigger number of unhandled staff and hence potential offenders

• The employees in larger departments tend to have wider knowledge of accesses than needed for their own specific functions

Page 19: Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Attempts on IS Applications in a Financial Institution

19

Data

• Log data from a single sign-on (ESSO) system spanning six months from Feb/2014 to July/2014 was collected in a financial institution in northern USA

• The ESSO system integrated 34 applications within the organization

• Based on an authentication and authorization interaction, the ESSO system allows the employees transverse through different IS applications without repeated sign-in.

Page 20: Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Attempts on IS Applications in a Financial Institution

20

ESSO architecture

Page 21: Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Attempts on IS Applications in a Financial Institution

21

ESSO architecture contd.• Policy Server — This component provides centralized policy management and

decisions on authentication and authorization requests made by WAM agent on behalf of the users attempting to access protected resources. The Policy Server performs key security operations including the following: • Authentication; Authorization; administration; Accounting

• Agent - Installed and configured within context of a standard Web server or application server, ESSO agent enables ESSO system to manage access to Web applications and content according to predefined security policies.

• Policy store – This is a repository where all the information managed by policy server resides.

Page 22: Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Attempts on IS Applications in a Financial Institution

22

Measurement

• Each entry in the ESSO log contains a user id, a timestamp, the application or resource the user requested, and the result of an event

• The dataset includes a total of 30,571,388 relevant entries spanning 6 months with 14,155 users from 105 departments

• We consider that a user starts a new session after inactive for at least 20 minutes

• In other words, any two log records within a 20-minute interval belong to a same session of a user. Otherwise, they belong to different sessions

• We excluded employees presented in the log for less than a month and minimal system access. The final dataset has a total number of observations of 56,323 emloyees with 9672 users from 78 departments.

Page 23: Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Attempts on IS Applications in a Financial Institution

23

Measurement contd.

• In total, we detected 1,469,014 sessions

• We labeled those sessions as off-hour accesses that were initiated at a time out of regular working hour (i.e., between 7:00am and 7:00pm ) on working day, or at anytime on weekends and bank holidays

• We labeled those sessions as off-site access if the initiating IP address of the sessions is from Demilitarized Zone (DMZ), where the users were connected into the internal systems via VPN

• An authorization acceptance (or AzthAccept) is logged if the user attempts to access an application (or resource) with granted privileges. And an authorization rejection (or AzReject) is logged if the user attempts to access an application or resource without granted privileges.

Page 24: Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Attempts on IS Applications in a Financial Institution

24

Number of sessions and percentage of AzReject

Page 25: Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Attempts on IS Applications in a Financial Institution

25

Percentage of Sessions from External IP and at Off-hour

Page 26: Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Attempts on IS Applications in a Financial Institution

26

Access SessionsTable 1 An Overview of the Dataset

Observation Period 6 month (Feb/2014-July/2014)

Total number of employees

9672 Number of monthly observations

56,323

 Months employees were present in the observation period (n=9672)

Mean Standard Deviation

Min Median Max

5.82 .60 2 6 6 

# of Departments 78      Department size (DeptSize) (n=78)

Mean Standard Deviation

Min Median Max

124 430.572 3 25.5 3636 Total # of Apps Tracked 34  

Page 27: Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Attempts on IS Applications in a Financial Institution

27

Descriptive statistics Table 2 Descriptive Statistics (n=56,323)

  MeanStandard Deviation Min Median Max

 Total sessions in a month of an employee (TotalSess)

24.658 30.629 1 14 338  

Sessions with rejects in a month of an employee (RejSess)

.123 1.468 0 0 130  Whether an employee has at least one unauthorized attempt in a month (Yes=1; No=0) (RejBin)

.058 .234 0 0 1  

Proportion of access attempts initiated off-hours in a month by an employee (Offhour)

.097 .162 0 .01 1  

Proportion of access attempts initiated from off-site in a month by an employee (Offsite)

.118 .242 0 0 1  

# Apps accessed in a month by an employee (Apps)

2.808 1.287 1 3 9  

Page 28: Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Attempts on IS Applications in a Financial Institution

28

Correlation coefficientsTable 3 Correlation Coefficients

  TotalSess RejSess RejBin Offhour OffSite Apps

TotalSess -- 0.081*** 0.039*** 0.071*** -0.094*** 0.339***

RejSess -- -- 0.337*** 0.009* 0.036*** 0.041***

RejBin -- -- -- 0.030*** 0.098*** 0.149***

Offhour --

-- -- --

0.113*** -0.072***

OffSite --

-- -- -- --

-0.080***

Apps -- -- -- -- -- --

***<.001; **<0.01; *<0.05; ^<0.1.

Page 29: Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Attempts on IS Applications in a Financial Institution

29

Data analysis and results

Page 30: Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Attempts on IS Applications in a Financial Institution

30

Likelihood to have Authorization Rejects in a given month

• We use RejBin as the dependent variable to indicate an employee has at least one authentication reject in a given month

• The full model is specified as:

where pit is the probability of an employee i having sessions with authentication rejects in month t. Tt is the fixed effect terms for month t, Ii is the fixed effect terms for employee (or individual) i, and βk (k=0,1,…,9) are the coefficients to be estimated

Page 31: Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Attempts on IS Applications in a Financial Institution

31

Likelihood to have authorization rejects in a given month contd.

Table 4 Likelihood of an employee to have unauthorized attempt(s) in a given month  Model Parameters Model 1 Model 2 Model 3 Month Fixed Effect Included Included Included Individual Fixed Effect Included Included Included Off-hour 1.419*** (.221) 1.186*** (.244) 1.614***(.258) Off-site 3.566***(.159) 3.554***(.160) 3.620***(.164) Apps 0.916***(.028) .915***(.028) 0.917***(.028) Off-hour*Off-site -- 1.461**(.587) 3.211***(.750) Off-hour*Log(DeptSize) -- -- 1.190***(.169) Off-site*Log(DeptSize) -- -- .184^(.101) Apps*Log(DeptSize) -- -- 0.027(.018) Off-hour*Off-site*Log(DeptSize) -- -- 1.267***(.470) Model Fit       -2LogL 7523.857 7517.473 7428.906 -2LogL (w/o covariates) 9427.15 9427.15 9427.15 AIC 7539.857 7535.473 7454.906 AIC (w/o covariates) 9427.15 9427.15 9427.15

    ***<.001; **<0.01; *<0.05; ^<0.1.  ·    The number inside the parentheses is the standard error of the estimate.  

Page 32: Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Attempts on IS Applications in a Financial Institution

32

Percentage of sessions with authorization rejects:

• To test how these factors influence the amount of authorization rejects, we use the percentage of sessions with authorization rejects as the dependent variable.

• It is calculated as the ratio between the number of sessions with authorized rejects and the total number of sessions of an employee in a given month

Page 33: Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Attempts on IS Applications in a Financial Institution

33

Percentage of sessions with authorization rejects: fixed-effects models contd.

Table 5 Percentage of sessions with unauthorized attempts in a given month: fixed-effect models

Model Parameters Model 4 Model 5 Model 6Month Fixed Effect Included Included IncludedIndividual Fixed Effect Included Included IncludedOff-hour 1.667***(.184) 1.304***(.185) 2.147***(.191)Off-site 5.464***(.140) 5.369***(.140) 5.271***(.140)Apps 0.213***(.022) 0.219***(.022) 0.216***(.022)

Off-hour*Off-site -- 8.243***(.527) 14.712***(.591)

Off-hour*Log(DeptSize) -- -- 1.385***(.122)Off-site*Log(DeptSize) -- -- .667***(.086)Apps*Log(DeptSize) -- -- .005(.014)

Off-hour*Off-site*Log(DeptSize) -- -- 6.60***(.332)

Model Fit      R2 33.9% 34.2% 35.1%    ***<.001; **<0.01; *<0.05

·    The number inside the parentheses is the standard error of the estimate.

Page 34: Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Attempts on IS Applications in a Financial Institution

34

Percentage of sessions with authorization rejects: a multi-level analysis

• An employee’s behavior observed at multiple time points may be correlated and driven by the same individual characteristics other than contextual variables

• Similarly, employees from a department may be driven by the department characteristics

Page 35: Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Attempts on IS Applications in a Financial Institution

35

Table 6 Percentage of sessions with unauthorized attempts in a month: three-level models Model Parameters Model 7 Model 8 Model 9FIXED EFFECTSMonth Fixed Effect Included Included IncludedIntercept .715*** (.074) .914*** (-0.094) .887*** (-0.109)Off-hour -- 1.218*** (-0.142) .900*** (-0.145)Off-site -- 3.309*** (-0.098) 3.223*** (-0.098)Apps -- .133*** (.018) .137*** (-0.018)Off-hour*Off-site -- -- 4.809*** (-0.4)VARIANCE of RANDOM COMPONENTSResidual (σ2

e) 16.829 16.285 16.219

Employee-Level Variance

Intercept (σ2u0) 3.332 3.536 3.566

Department-Level VarianceIntercept (σ2

w0) 0.202 0.312 0.517

MODEL FITDeviance 326314 324992 324852AIC 326320 324998 324858 ***<.001; **<0.01; *<0.05.· The number inside the parentheses is the standard error of the estimate.

Percentage of sessions with unauthorized attempts in a month: three-level models

Page 36: Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Attempts on IS Applications in a Financial Institution

36

Percentage of sessions with unauthorized attempts in a month: three-level models contd.Table 6 Percentage of sessions with unauthorized attempts in a month: three-level models

Model Parameters Model 10 Model 11 Model 12 Model 13FIXED EFFECTSMonth Fixed Effect Included Included Included IncludedIntercept 0.977*** (-0.199) 1.345*** (-0.098) 1.458*** (-0.1) 1.484*** (-0.101)Off-hour 0.902*** (-0.145) 1.337*** (-0.176) 0.157 (-0.399) 1.855*** (-0.568)Off-site 3.224*** (-0.098) 5.822*** (-0.216) 4.673*** (-0.509) 6.786*** (-0.716)Apps .136*** (-0.018) .129*** (-0.016) .123** (-0.04) .151* (-0.065)Off-hour*Off-site 4.809*** (-0.4) 12.282*** (-1.221) 8.083*** (-2.53) 19.404*** (-3.352)Log(DeptSize) 0.039 (-0.071) 0.023 (-0.041) .082* (-0.042) .109** (-0.043)Off-hour*Log(DeptSize) -- -- -- 0.913*** (-0.244)Off-site*Log(DeptSize) -- -- -- 1.158*** (-0.321)Apps*Log(DeptSize) -- -- -- 0.011 (-0.028)Off-hour* Off-site* Log(DeptSize) -- -- -- 6.567*** (-1.522)VARIANCE of RANDOM COMPONENTSResidual (σ2

e) 16.2193 8.789 8.778 8.778Employee-Level VarianceIntercept (σ2

u0) 3.5658 2.4168 2.4037 2.402Off-hour (σ2

u1) -- 15.6275 13.285 13.456Off-site (σ2

u2) -- 161.5 159.04 159.22Apps (σ2

u3) -- 0.2 0.189 0.19Off-hour*Off-site (σ2

u4) -- 1977.63 1745.67 1735.41Department-Level VarianceIntercept (σ2

w0) 0.521 0.088 0.091 0.092Off-hour (σ2

w1) -- -- 5.147 3.225Off-site (σ2

w2) -- -- 7.431 4.929Apps (σ2

w3) -- -- 0.044 0.045Off-hour*Off-site (σ2

w4) -- -- 168.12 96.162MODEL FITDeviance 324855 305060 304777 304747AIC 324861 305074 304799 304769 ***<.001; **<0.01; *<0.05.· The number inside the parentheses is the standard error of the estimate.

Page 37: Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Attempts on IS Applications in a Financial Institution

39

DiscussionHypothesis Results

H1: Off-hour accesses are positively associated with unauthorized access attempts.

Supported

H2: Off-site accesses are positively associated with unauthorized access attempts.

Supported

H3: The interaction of off-hour and off-site accesses are positively associated with unauthorized access attempts.

Supported

H4: IS application exposure are positively associated with unauthorized access attempts.

Supported

H4: employees from larger departments are associated with greater number of unauthorized attempts.

Supported

H5: Department size reinforces the effect of off-hour accesses unauthorized access attempts such that in a larger department, off-hour accesses are more positively associated with unauthorized access attempts than in a smaller department.

Supported

Page 38: Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Attempts on IS Applications in a Financial Institution

DiscussionHypothesis ResultsH6: Department size reinforces the effect of off-site accesses on unauthorized access attempts such that in a larger department, off-site accesses is more positively associated with unauthorized access attempts than in a smaller department.

Supported

H7: Department size reinforces the effect of the off-hour and off-site interaction on unauthorized access attempts such that in a larger department, the effect of the interaction term is more positively associated with unauthorized access attempts than in a smaller department.

Supported

H8: Department size reinforces the effect of IS application exposure on unauthorized access attempts such that in a larger department, IS application exposure is more positively associated with unauthorized access attempts than in a smaller department.

Not Supported

40

Page 39: Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Attempts on IS Applications in a Financial Institution

41

Implications• With the increasing trend of allowing employees to work on a more convenient

schedule and location

• The importance of understanding how access related behaviors change when employees are not bound by traditional temporal and spatial bounds has never been higher

• Recent examples from high profile data breaches (Snowden, Target, Societe Generale) highlight the importance of tighter and more secure insider access controls

Page 40: Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Attempts on IS Applications in a Financial Institution

42

Implications contd.• Implications are manifold for cybersecurity

– Threat Intelligence• Provides invaluable intelligence on threat agents (insiders) and their behavior

around inappropriate access to corporate information.– Useful insights into attack vectors (offsite access) and attack

surface (application exposure)– Vulnerability Management

• Results can aid companies with addressing both social vulnerabilities (responding to effects of department size) and technical vulnerabilities (problems with access management)

– Risk Mitigation• Results of the study can equip companies with knowledge needed to effectively

mitigate resulting risks.– Control Environment

• Stricter policies and monitoring for off hour access

Page 41: Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Attempts on IS Applications in a Financial Institution

43

Page 42: Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Attempts on IS Applications in a Financial Institution

44

APPENDIX

Page 43: Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Attempts on IS Applications in a Financial Institution

Percentage of sessions with unauthorized attempts in a month: three-level models

Model Parameters Model 10 Model 11 Model 12 Model 13 Model 14 Model 15 Model 16FIXED EFFECTS  

Month Fixed Effect Included Included Included Included Included Included Included

Intercept .715*** (.074) .914***(.094)

.887***(.109)

0.977***(.199)

1.345***(.098)

1.458***(.100)

1.484***(.101)

Off-hour -- 1.218***(.142)

.900***(.145)

0.902***(.145)

1.337***(.176)

.157(.399)

1.855***(.568)

Off-site -- 3.309***(.098)

3.223***(.098)

3.224***(.098)

5.822***(.216)

4.673***(.509)

6.786***(.716)

Apps -- .133*** (.018) .137***(.018)

.136***(.018)

.129***(.016)

.123**(.040)

.151*(.065)

Off-hour*Off-site -- -- 4.809***(.400)

4.809***(.400)

12.282***(1.221)

8.083***(2.530)

19.404***(3.352)

Log(DeptSize) -- -- -- .039(.071)

.023(.041)

.082*(.042)

.109**(.043)

Off-hour*Log(DeptSize) -- -- -- -- -- -- 0.913***(.244)

Off-site*Log(DeptSize) -- -- -- -- -- -- 1.158***(.321)

Apps*Log(DeptSize) -- -- -- -- -- -- .011(.028)

Off-hour* Off-site* Log(DeptSize) -- -- -- -- -- -- 6.567***

(1.522)

45

Page 44: Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Attempts on IS Applications in a Financial Institution

Percentage of sessions with unauthorized attempts in a month: three-level models

Model Parameters Model 10 Model 11 Model 12 Model 13 Model 14 Model 15 Model 16

VARIANCE of RANDOM COMPONENTS  

Residual (σ2e) 16.829 16.285 16.219 16.2193 8.789 8.778 8.778

Employee-Level Variance

Intercept (σ2u0) 3.332 3.536 3.566 3.5658 2.4168 2.4037 2.402

Off-hour (σ2u1) -- -- -- -- 15.6275 13.285 13.456

Off-site (σ2u2) -- -- -- -- 161.5 159.040 159.220

Apps (σ2u3) -- -- -- -- .200 .189 .190

Off-hour*Off-site (σ2u4) -- -- -- -- 1977.630 1745.670 1735.41

0

46

Page 45: Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Attempts on IS Applications in a Financial Institution

Percentage of sessions with unauthorized attempts in a month: three-level models

Model Parameters Model 10 Model 11 Model 12 Model 13 Model 14 Model 15 Model 16

Department-Level Variance  

Intercept (σ2w0) 0.202 0.312 0.517 0.521 0.088 0.091 0.092

Off-hour (σ2w1) -- -- -- -- -- 5.147 3.225

Off-site (σ2w2) -- -- -- -- -- 7.431 4.929

Apps (σ2w3) -- -- -- -- -- 0.044 0.045

Off-hour*Off-site (σ2w4) -- -- -- -- -- 168.120 96.162

MODEL FIT  

Deviance 326314 324992 324852 324855 305060 304777 304747

AIC 326320 324998 324858 324861 305074 304799 304769

***<.001; **<0.01; *<0.05.  

· The number inside the parentheses is the standard error of the estimate.  47

Page 46: Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Attempts on IS Applications in a Financial Institution

48

Suspicious Behavior of Leaving/Switching Employees

• Those employees who are going to quit or switch to a different department may have the intention to explore the accessible resources, and therefore exhibit more suspicious activities before leave.

• We consider a user as a leaving/switching employee if his username stops generating logs for at least one month in our sampling period.

• We only consider those frequent users who appeared in 2+ months and generated 30+ sessions.

• In total, we detected 738 users across 51 departments.