Mitigating Malicious Insider Threats to Common Data Environments in the Architecture, Engineering, and Construction Industry: An Incomplete Information Game Approach
Abstract
:1. Introduction
2. Related Work
- Aspect 1 (A1): The value of information/data/resources to an insider.
- Aspect 2 (A2): Penalty to a malicious insider when his/her activity and identity are exposed.
- Aspect 3 (A3): How the sensitive information/data are compromised (e.g., through authentication or cyberattack).
- Aspect 4 (A4): The probability of discovering the malicious activities and the insider’s identity.
- Aspect 5 (A5): The prior belief/information that the data defender has about an insider.
3. Methodology
3.1. Defining the Data Defender
3.1.1. Access Control
3.1.2. Intrusion Detection
3.2. Simultaneous Move Game Model
- If the data are released to an insider who happens to be malicious, the data will be misused (e.g., trading them for financial purposes, sending them to the enemy) by the malicious insider.
- On the other hand, if the data request is rejected, there is a probability of rejecting a legitimate insider request. Though the data are protected in this situation, the project team would be unable to achieve the expected outcome/goal in the project work due to the information (data) necessary for the project being withheld. That is, the workflow will be interrupted, for example, during the design phase.
3.2.1. Payoff Functions
3.2.2. Solution of the Game: Bayesian Nash Equilibrium (BNE)
- If , the unique pure strategy equilibrium suggests that malicious insiders opt for cyberattacks , while legitimate insiders choose authentication . The defender, in response, accepts the data access request .
- If , a mixed strategy equilibrium emerges, with malicious insiders alternating between cyberattacks and authentication ( and ) and legitimate insiders also using authentication with probability . The defender adapts probabilistically.
- If , both malicious and legitimate insiders choose authentication but the defender rejects the access request .
- If , the unique pure strategy equilibrium involves all insiders choosing authentication (, and the defender grants access .
- If , the strategy shifts, with all insiders continuing to authenticate, but the defender now rejects access ().
3.2.3. Extended Simultaneous Move Game Model
3.2.4. Solution of the Extended Simultaneous Move Game Model
- If , the unique pure strategy equilibrium indicates that malicious insiders launch cyberattacks , legitimate insiders authenticate , and the defender accepts the access request .
- If , t mixed strategy equilibrium arises, with malicious insiders mixing between cyberattacks and authentication strategies and ) and legitimate insiders also adopting a probabilistic authentication strategy and . The defender adjusts probabilistically.
- If , both malicious and legitimate insiders select authentication but the defender rejects the access request .
- At low , the defender is inclined to accept requests, reflecting a trust-oriented strategy when the malicious probability is low.
- For intermediate , mixed strategies dominate, reflecting the defender’s uncertainty and the malicious insider’s strategic adaptation.
- At high , rejection becomes the optimal strategy to mitigate the risk posed by potentially malicious insiders.
- If , the unique pure strategy equilibrium involves all insiders selecting authentication and the defender accepts the request .
- If , the strategy shifts, with all insiders continuing to authenticate, but the defender rejects the access request ().
3.3. Sequential Move Game Model
3.3.1. Solution of the Sequential Move Game Model
- Insider Strategy: Both malicious and legitimate insiders choose authentication .
- Defender Strategy: The defender accepts authentication requests () but rejects cyberattacks .
- Insider Strategy: Malicious insiders choose cyberattack and legitimate insiders choose authentication .
- Defender Strategy: The defender accepts authentication requests but rejects cyberattacks .
- Outcome: No equilibrium exists because the defender cannot effectively balance the cost of rejecting requests and the risk of allowing malicious activity.
- Insider Strategy: Both malicious and legitimate insiders choose authentication ().
- Defender Strategy: The defender rejects both authentication requests and cyberattacks .
- Insider Strategy: Malicious insiders choose cyberattack and legitimate insiders choose authentication .
- Defender Strategy: The defender accepts all requests .
- Insider Strategy: Both malicious and legitimate insiders choose authentication ().
- Defender Strategy: The defender accepts all requests .
- Outcome: No equilibrium exists because the defender cannot formulate a consistent response strategy for high .
3.3.2. Perfect Bayesian Nash Equilibrium (PBE)
4. Verification and Validation
4.1. Verification of the Proposed Models
4.2. Implementation of the Proposed Model in a Construction Example
- Pranksters are the attackers who perform attacks without serious intentions, mostly for fun.
- Hacksters are the ones hacking to improve their skills and out of curiosity.
- Malicious hackers are cyber actors who desire destruction and cause damage for self-pleasure.
- Personal problem solvers commit their activities to gain personal benefit. They cannot solve their issues through legal ways and use cyberattacks for that purpose.
- Career criminals have pure financial motivations.
- Extreme advocates perform their activities due to social movements, religious reasons, or political motivations. They have also been called hacktivists.
- Malcontents, addicts, and individuals are attackers mostly with psychological problems, such as antisocial personality disorder.
4.2.1. Overview of the Hypothetical Scenarios
- The cost and schedule forecast file shows the details of the contractor’s cost calculations for various tasks, the internal schedule for the remaining work, the profitability analysis of the contractor, and the risk register of the project. The file is “critical” in terms of confidentiality since it includes the financial details of the project, such as the cost of various tasks, the profitability of the project, and the cost of materials and services. Since this information is only available to a few people in the project, the accessibility level of the file is “very low” (Table 6). The file’s integrity has a “medium” criticality since the data alterations might mislead the project management and cause wrong decisions to be made. However, it is not as critical as the confidentiality aspect. Lastly, the availability of the file has low criticality since its unavailability does not disrupt the business functions or site operations. Since the malicious insider has a financial motivation, the file is of “critical” value. He/she can potentially sell the sensitive content of the file to competitors or ask for a ransom in exchange for not leaking the data. Therefore, the insider primarily targets this file.
- The structural design file includes all the details regarding the structural elements, such as the reinforcement details, concrete and other structural material characteristics, and the connection details of each element. Since it is a building information model, all details, including the exact locations of the structural elements, are included in the file. The file has a “medium” criticality in terms of confidentiality since it includes intellectual property. The most critical aspect of the file is its integrity since a stealthy attacker could tamper with the structural design details and mislead the site teams about the execution. This could potentially cause a reduction in the strength of the structural elements, which might cause a catastrophic failure of the building during the operational phase. Considering that the building is a hospital, the criticality of properly implementing the correct structural design further increases. Finally, the availability of the file has “medium” importance since the unavailability might cause disruptions to site activities, which might indirectly lead to financial loss. The accessibility of the file is “medium” as there are a considerable number of project participants, such as the structural design team, quantity surveyor, and cost estimator, who need this information to perform their tasks. From the malicious insider’s perspective, the file is not as valuable as the cost and schedule forecast file. However, he/she can attack the file with ransomware and threaten the project by permanently destroying it or leaking its content. Considering that the file has medium-level sensitivity in terms of confidentiality and availability, it is also of medium importance to the malicious insider.
4.2.2. Discussion of the BNE for Hypothetical Scenarios
4.3. Validation of the Applicability of the Proposed Model Using Real Project Data
4.3.1. Interviews with Construction Experts
4.3.2. Evaluation of the Proposed Models
4.3.3. Overview of the File Types
4.3.4. Overview of Projects
4.3.5. Implementation of the Model
4.3.6. Discussion of the BNE for Real Project Data
5. Discussion and Limitations
6. Conclusions and Future Work
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
Appendix A
Appendix B
Appendix C
Appendix D
Notation | Meaning |
---|---|
Request through authentication | |
Request through cyberattack | |
Accept data access request and release data | |
Reject data access request and do not release data | |
Cost of cyberattack | |
Action set of an insider | |
Action set of the defender | |
Type set of an insider | |
Pure strategy set of an insider in the simultaneous move gamemodel | |
Pure strategy set of the defender in the simultaneous move gamemodel | |
Pure strategy set of an insider in the sequential move game model | |
Payoff due to discovery of malicious insider identity or dataprotection | |
Payoff corresponding to compromising data | |
Probability that malicious insider who uses authentication isdiscovered | |
Probability that malicious insider who launches a cyberattack isdiscovered | |
Player i’s payoff corresponding to profile (a, b) and insider type θ | |
Set of players in the game | |
Strategy space | |
Set of real numbers | |
Set of positive real numbers | |
Nature that can be considered as a non-strategic player | |
Malicious type | |
L | Legitimate type |
Probability that an insider is malicious | |
Probability that an insider is legitimate | |
Player i’ s expected payoff corresponding to strategy profile in the simultaneous move game | |
Player i’ s expected payoff corresponding to strategy profile in the sequential move game | |
in the sequential move game model | |
Proposed simultaneous move game model | |
Extended simultaneous move game model | |
Proposed sequential move game model | |
BNE | Bayesian Nash Equilibrium |
PBE | Perfect Bayesian Nash Equilibrium |
References
- Mantha, B.; García De Soto, B.; Karri, R. Cyber security threat modeling in the AEC industry: An example for the commissioning of the built environment. Sustain. Cities Soc. 2021, 66, 102682. [Google Scholar] [CrossRef]
- Watson, S. Cyber-Security: What Will It Take for Construction to Act? Construction News. Available online: https://www.constructionnews.co.uk/tech/cyber-security-what-will-it-take-for-construction-to-act-22-01-2018/ (accessed on 24 November 2023).
- FinalCode. Managing CAD File Data Leakage Risks in Design-Centric Businesses; FinalCode: San Jose, CA, USA, 2016; Available online: https://www.finalcode.com/en/wp-content/uploads/2017/08/FC-WP-CAD-ManagingFileDataLeakage-072516d.pdf (accessed on 5 April 2024).
- Sawyer, T.; Rubenstone, J. Construction Cybercrime Is on the Rise. Engineering News-Record (ENR). Available online: https://www.enr.com/articles/46832-construction-cybercrime-is-on-the-rise (accessed on 4 February 2024).
- Tao, X.; Das, M.; Liu, Y.; Cheng, J.C.P. Distributed common data environment using blockchain and Interplanetary File System for secure BIM-based collaborative design. Autom. Constr. 2021, 130, 103851. [Google Scholar] [CrossRef]
- Sonkor, M.S.; García de Soto, B. Towards Secure Construction Networks: A Data-Sharing Architecture Utilizing Blockchain Technology and Decentralized Storage. In Proceedings of the Construction Blockchain Consortium Conference 2021 (CBC2021), London, UK, 20–22 October 2021. [Google Scholar]
- Turk, Ž.; Sonkor, M.S.; Klinc, R. Cybersecurity Assessment of BIM/CDE Design Environment Using Cyber Assessment Framework. J. Civ. Eng. Manag. 2022, 28, 349–364. [Google Scholar] [CrossRef]
- Turk, Ž.; García De Soto, B.; Mantha, B.R.K.; Maciel, A.; Georgescu, A. A systemic framework for addressing cybersecurity in construction. Autom. Constr. 2022, 133, 103988. [Google Scholar] [CrossRef]
- García De Soto, B.; Turk, Ž.; Maciel, A.; Mantha, B.; Georgescu, A.; Sonkor, M.S. Understanding the Significance of Cybersecurity in the Construction Industry: Survey Findings. J. Constr. Eng. Manag. 2022, 148, 04022095. [Google Scholar] [CrossRef]
- Maglaras, L.; Janicke, H.; Ferrag, M.A. Cybersecurity of Critical Infrastructures: Challenges and Solutions. Sensors 2022, 22, 5105. [Google Scholar] [CrossRef]
- Gheyas, I.A.; Abdallah, A.E. Detection and prediction of insider threats to cyber security: A systematic literature review and meta-analysis. Big Data Anal. 2016, 1, 6. [Google Scholar] [CrossRef]
- Hu, P.; Li, H.; Fu, H.; Cansever, D.; Mohapatra, P. Dynamic defense strategy against advanced persistent threat with insiders. In Proceedings of the 2015 IEEE Conference on Computer Communications (INFOCOM), Hong Kong, China, 26 April–1 May 2015; IEEE: Piscataway, NJ, USA, 2015; pp. 747–755. [Google Scholar]
- Ni, S.; Zou, S.; Chen, J. Evolutionary Game Model of Internal Threats to Nuclear Security in Spent Fuel Reprocessing Plants Based on RDEU Theory. Sustainability 2022, 14, 2163. [Google Scholar] [CrossRef]
- Kim, K.-N.; Suh, Y.-A.; Schneider, E.; Yim, M.-S. Physical Protection System Design Analysis against Insider Threat based on Game Theoretic Modeling. In Proceedings of the Transactions of the Korean Nuclear Society Spring Meeting, Jeju, Korea, 7–8 May 2015. [Google Scholar]
- Kim, K.-N.; Yim, M.-S.; Schneider, E. A study of insider threat in nuclear security analysis using game theoretic modeling. Ann. Nucl. Energy 2017, 108, 301–309. [Google Scholar] [CrossRef]
- Liu, D.; Wang, X.; Camp, J. Game-theoretic modeling and analysis of insider threats. Int. J. Crit. Infrastruct. Prot. 2008, 1, 75–80. [Google Scholar] [CrossRef]
- Kantzavelou, I.; Katsikas, S. A game-based intrusion detection mechanism to confront internal attackers. Comput. Secur. 2010, 29, 859–874. [Google Scholar] [CrossRef]
- Elmrabit, N.; Yang, S.-H.; Yang, L.; Zhou, H. Insider Threat Risk Prediction based on Bayesian Network. Comput. Secur. 2020, 96, 101908. [Google Scholar] [CrossRef]
- Laszka, A.; Johnson, B.; Schöttle, P.; Grossklags, J.; Böhme, R. Managing the Weakest Link. In Proceedings of the Computer Security—ESORICS 2013, Egham, UK, 9–13 September 2013; Crampton, J., Jajodia, S., Mayes, K., Eds.; Springer: Berlin/Heidelberg, Germany, 2013; pp. 273–290. [Google Scholar] [CrossRef]
- Feng, X.; Zheng, Z.; Cansever, D.; Swami, A.; Mohapatra, P. Stealthy attacks with insider information: A game theoretic model with asymmetric feedback. In Proceedings of the MILCOM 2016—2016 IEEE Military Communications Conference, Baltimore, MD, USA, 1–3 November 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 277–282. [Google Scholar] [CrossRef]
- Cansever, D. Security Games with Insider Threats. In Decision and Game Theory for Security; Zhu, Q., Baras, J.S., Poovendran, R., Chen, J., Eds.; Lecture Notes in Computer Science; Springer International Publishing: Cham, Switzerland, 2020; Volume 12513, pp. 502–505. [Google Scholar]
- Liu, D.; Wang, X.; Camp, L.J. Mitigating Inadvertent Insider Threats with Incentives. In Financial Cryptography and Data Security; Dingledine, R., Golle, P., Eds.; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2009; Volume 5628, pp. 1–16. [Google Scholar]
- Gataullin, T.M.; Gataullin, S.T.; Ivanova, K.V. Synergetic Effects in Game Theory. In Proceedings of the 2020 13th International Conference “Management of Large-Scale System Development” (MLSD), Moscow, Russia, 28–30 September 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 1–5. [Google Scholar] [CrossRef]
- Joshi, C.; Aliaga, J.R.; Insua, D.R. Insider Threat Modeling: An Adversarial Risk Analysis Approach. IEEE Trans. Inf. Forensics Secur. 2021, 16, 1131–1142. [Google Scholar] [CrossRef]
- Hu, T.; Xin, B.; Liu, X.; Chen, T.; Ding, K.; Zhang, X. Tracking the Insider Attacker: A Blockchain Traceability System for Insider Threats. Sensors 2020, 20, 5297. [Google Scholar] [CrossRef]
- Kim, J.; Park, M.; Kim, H.; Cho, S.; Kang, P. Insider Threat Detection Based on User Behavior Modeling and Anomaly Detection Algorithms. Appl. Sci. 2019, 9, 4018. [Google Scholar] [CrossRef]
- Hall, A.J.; Pitropakis, N.; Buchanan, W.J.; Moradpoor, N. Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier. In Proceedings of the 2018 IEEE International Conference on Big Data (Big Data), Seattle, WA, USA, 10–13 December 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 5034–5039. [Google Scholar] [CrossRef]
- Al-Shehari, T.; Alsowail, R.A. An Insider Data Leakage Detection Using One-Hot Encoding, Synthetic Minority Oversampling and Machine Learning Techniques. Entropy 2021, 23, 1258. [Google Scholar] [CrossRef] [PubMed]
- Azaria, A.; Richardson, A.; Kraus, S.; Subrahmanian, V.S. Behavioral Analysis of Insider Threat: A Survey and Bootstrapped Prediction in Imbalanced Data. IEEE Trans. Comput. Soc. Syst. 2014, 1, 135–155. [Google Scholar] [CrossRef]
- Chattopadhyay, P.; Wang, L.; Tan, Y.-P. Scenario-Based Insider Threat Detection From Cyber Activities. IEEE Trans. Comput. Soc. Syst. 2018, 5, 660–675. [Google Scholar] [CrossRef]
- Brdiczka, O.; Liu, J.; Price, B.; Shen, J.; Patil, A.; Chow, R.; Bart, E.; Ducheneaut, N. Proactive Insider Threat Detection through Graph Learning and Psychological Context. In Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, San Francisco, CA, USA, 24–25 May 2012; IEEE: Piscataway, NJ, USA, 2012; pp. 142–149. [Google Scholar] [CrossRef]
- Fudenberg, D.; Tirole, J. Game Theory; MIT Press: Cambridge, MA, USA, 1991. [Google Scholar]
- Manshaei, M.H.; Zhu, Q.; Alpcan, T.; Bacşar, T.; Hubaux, J.-P. Game theory meets network security and privacy. ACM Comput. Surv. 2013, 45, 1–39. [Google Scholar] [CrossRef]
- Zhu, Y.; Huang, D.; Hu, C.-J.; Wang, X. From RBAC to ABAC: Constructing Flexible Data Access Control for Cloud Storage Services. IEEE Trans. Serv. Comput. 2015, 8, 601–616. [Google Scholar] [CrossRef]
- Adzroe, E.; Ingirige, B. Innovation in e-business: Issues related to adoption for micro and SME organisations. In Advances in Construction ICT and e-Business; Perera, S., Ingirige, B., Ruikar, K., Obonyo, E., Eds.; Routledge: London, UK, 2017; pp. 316–339. [Google Scholar] [CrossRef]
- Vasilyevna, N.B. An RBAC Design with Discretionary and Mandatory Features. In Proceedings of the 2008 International Symposium on Ubiquitous Multimedia Computing, Hobart, Australia, 13–15 October 2008; IEEE: Piscataway, NJ, USA, 2008; pp. 260–263. [Google Scholar] [CrossRef]
- Autodesk. Security Whitepaper. Available online: https://construction.autodesk.com/resources/guides/acc-security-whitepaper/ (accessed on 9 April 2023).
- Homoliak, I.; Toffalini, F.; Guarnizo, J.; Elovici, Y.; Ochoa, M. Insight Into Insiders and IT: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures. ACM Comput. Surv. 2020, 52, 1–40. [Google Scholar] [CrossRef]
- Das, M.; Tao, X.; Cheng, J.C.P. BIM security: A critical review and recommendations using encryption strategy and blockchain. Autom. Constr. 2021, 126, 103682. [Google Scholar] [CrossRef]
- Stamou, A.I. Verification and application of a mathematical model for the assessment of the effect of guiding walls on the hydraulic efficiency of chlorination tanks. J. Hydroinform. 2002, 4, 245–254. [Google Scholar] [CrossRef]
- Yao, D. Game-Models-Simulation-Code. GitHub. Available online: https://github.com/SMART-NYUAD/Game-models-simulation-code (accessed on 2 April 2024).
- Hughes, W.; Murdoch, J. Roles in Construction Projects: Analysis and Terminology; Construction Industry Publications: Birmingham, UK, 2001. [Google Scholar]
- FIRST. Common Vulnerability Scoring System Version 3.1; FIRST: Cary, NC, USA, 2019; Available online: https://www.first.org/cvss/v3.1/specification-document (accessed on 4 February 2024).
- Parker, D.B. Fighting Computer Crime: A New Framework for Protecting Information; Wiley: New York, NY, USA, 1998. [Google Scholar]
- Dreyfus, H.L.; Drey-fus, S.E.; Zadeh, L.A. Mind over Machine: The Power of Human Intuition and Expertise in the Era of the Computer. IEEE Expert 1987, 2, 110–111. [Google Scholar] [CrossRef]
- ISO/IEC ISO/IEC 27001:2022; Information Security, Cybersecurity and Privacy Protection—Information Security Management Systems—Requirements. ISO/IEC: Geneva, Switzerland, 2022. Available online: https://www.iso.org/standard/27001 (accessed on 4 February 2024).
- Silvander, J.; Singh, S.P. Validating Trust in Human Decisions to Improve Expert Models Based on Small Data Sets. In Business Modeling and Software Design; Shishkov, B., Ed.; Lecture Notes in Business Information Processing; Springer Nature: Cham, Switzerland, 2023; Volume 483, pp. 256–267. [Google Scholar] [CrossRef]
- Almomani, M.A.; Basri, S.; Almomani, O.; Capretz, L.F.; Balogun, A.; Husni, M.; Gilal, A.R. Using an Expert Panel to Validate the Malaysian SMEs-Software Process Improvement Model (MSME-SPI). In Software Engineering Perspectives in Intelligent Systems; Silhavy, R., Silhavy, P., Prokopova, Z., Eds.; Advances in Intelligent Systems and Computing; Springer International Publishing: Cham, Switzerland, 2020; Volume 1294, pp. 844–859. [Google Scholar] [CrossRef]
- Pleshakova, E.; Osipov, A.; Gataullin, S.; Gataullin, T.; Vasilakos, A. Next gen cybersecurity paradigm towards artificial general intelligence: Russian market challenges and future global technological trends. J. Comput. Virol. Hacking Tech. 2024, 20, 429–440. [Google Scholar] [CrossRef]
Authors | Approach | Aspects Considered | ||||
---|---|---|---|---|---|---|
A1 | A2 | A3 | A4 | A5 | ||
Liu et al. [16] | Stochastic game | yes | no | yes | yes | no |
Laszka et al. [19] | Stochastic game | yes | no | yes | no | no |
Liu et al. [22] | Static game | yes | yes | no | no | no |
Hu et al. [12] | Differential game | yes | yes | no | yes | no |
Feng et al. [20] | Sequential game | yes | yes | no | yes | no |
Cansever et al. [21] | Stackelberg game | yes | yes | no | yes | no |
Kim et al. [14] | Stackelberg game | yes | no | yes | yes | no |
Kantzavelou et al. [17] | Repeated game | yes | no | yes | yes | no |
Ni et al. [13] | Evolutionary game | yes | yes | no | yes | no |
Hu et al. [25] | Blockchain | yes | no | yes | yes | no |
Elmrabit et al. [18] | Bayesian network | yes | no | no | yes | yes |
Joshi et al. [24] | Adversarial risk analysis | yes | no | no | yes | yes |
Azaria et al. [29] | Machine learning | yes | no | yes | yes | no |
Hall et al. [27] | Machine learning | yes | no | yes | yes | no |
Kim et al. [26] | Machine learning | yes | no | yes | yes | no |
Al-Shehari et al. [28] | Machine learning | yes | no | yes | yes | no |
Brdiczka et al. [31] | Graph learning | yes | no | yes | yes | no |
Chattopadhyay et al. [30] | Time-series classification | yes | no | yes | yes | no |
Categories | Sub-Categories | Sample Roles |
---|---|---|
Client | (i) Client | Client |
(ii) Client’s representative | Client project manager Client liaison officer | |
Advisor/Consultant | (i) Management | Project manager Construction manager Design coordinator Design manager BIM coordinator BIM manager |
(ii) Design | Architectural designer Civil and structural engineer Geotechnical engineer Mechanical and electrical engineer Fire engineer | |
(iii) Financial | Cost consultant Cost planner Quantitative surveyor | |
Builders and con- tractors | (i) Constructor | Project manager Construction manager Construction scheduler Construction cost estimator Contract manager Site manager Site engineer Quantitative surveyor BIM manager BIM coordinator BIM specialist IT manager IT specialist Business manager Human resource manager Administrator |
(ii) Partial responsibility | Sub-contractor |
Malicious Insider Expertise Level | Project Security Level | File Accessibility Level | Rating Scale | Rating Average | |
---|---|---|---|---|---|
Novice | Very low | Very high | 0 | 0.2 | 0.1 |
Advanced beginner | Low | High | 0.2 | 0.4 | 0.3 |
Competent | Medium | Medium | 0.4 | 0.6 | 0.5 |
Proficient | High | Low | 0.6 | 0.8 | 0.7 |
Expert | Very high | Very low | 0.8 | 1 | 0.9 |
Project Type Project Phase | Smart Hospital Building Construction Phase | |
---|---|---|
Scenarios | Characteristic | Value |
Scenario 1 | The overall security level of the project | High (0.7) (See Table 3) |
The probability that the malicious insider who launches a cyberattack is detected | 0.7 | |
The probability that the malicious insider who uses authentication is detected | 0.8 | |
Scenario 2 | The overall security level of the project | Medium (0.5) (See Table 3) |
The probability that the malicious insider who launches a cyberattack is detected | 0.49 | |
The probability that the malicious insider who uses authentication is detected | 0.55 |
Characteristic | Value |
---|---|
Type of malicious insider | Career criminal |
The motivation of the malicious insider | Financial gain |
Insider’s expertise level | Advanced beginner (0.3) (See Figure 3) |
The initial probability of being a malicious | 0.2 |
The probability of being a malicious insider at | 0.8 |
File Type | Criticality of the File (for the Project) | Payoff Due to Discovery of Malicious Insider Identity or Data Protection (ω) | Value of the File to the Malicious Insider | Payoff Corresponding to Compromised Data (β) | File Accessibility Level | Project Security Level | File Security Level | Malicious Insider’s Expertise Level | Cost of Cyberattack (Ccyb) | Bayesian Nash Equilibrium (BNE) | ||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Cybersecurity Attribute | Criticality | ω | Average ω | |||||||||
Cost and Schedule Forecast File | Confidentiality | Critical | 0.95 | 0.57 | Critical | 0.95 | Very low: 0.9 | High: 0.7 | (0.9 × 0.7) = 0.63 | Advanced beginner: 0.3 | (0.63 − 0.3) = 0.33 | E |
Integrity | Medium | 0.55 | ||||||||||
Availability | Low | 0.2 | ||||||||||
Structural Design File | Confidentiality | Medium | 0.55 | 0.68 | Medium | 0.5 | Medium: 0.5 | (0.5 × 0.7) = 0.35 | (0.35 − 0.3) = 0.05 | D | ||
Integrity | Critical | 0.95 | ||||||||||
Availability | Medium | 0.55 |
File Type | Criticality of the File (for the Project) | Payoff Due to discovery of Malicious Insider Identity or Data Protection (ω) | Value of the File to the Malicious Insider | Payoff Corresponding to Compromised Data (β) | File Accessibility Level | Project Security Level | File Security Level | Malicious Insider’s Expertise Level | Cost of Cyberattack (Ccyb) | Bayesian Nash Equilibrium (BNE) | ||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Cybersecurity Attribute | Criticality | ω | Average ω | |||||||||
Cost and Schedule Forecast File | Confidentiality | Critical | 0.95 | 0.57 | Critical | 0.95 | Very low: 0.9 | Medium: 0.5 | (0.9 × 0.5) = 0.45 | Advanced beginner: 0.3 | (0.45 − 0.3) = 0.15 | B |
Integrity | Medium | 0.55 | ||||||||||
Availability | Low | 0.2 | ||||||||||
Structural Design File | Confidentiality | Medium | 0.55 | 0.68 | Medium | 0.5 | Medium: 0.5 | (0.5 × 0.5) = 0.25 | (0.25 − 0.3) < 0 | A | ||
Integrity | Critical | 0.95 | ||||||||||
Availability | Medium | 0.55 |
No. | Parameters | Experts’ Rankings (1–5) |
---|---|---|
1. | δ (The initial probability of being a malicious insider) | 5 |
2. | p1 and p2 (The probability that the malicious insider is detected) | 4 |
3. | ω (Payoff/reward to the data defender due to detection of the malicious insider) | 5 |
4. | β (Payoff/reward to malicious insider due to stolen data/compromised data) | 5 |
5. | Ccyb (Cost of cyberattack) | 5 |
Project Phase | Construction Phase | |
---|---|---|
Scenarios | Characteristic | Value |
Project 1 (High-rise building) | The overall security level of the project | Medium (0.5) (See Table 3) |
The probability that the malicious insider who launches a cyberattack is detected | 0.49 | |
The probability that the malicious insider who uses authentication is detected | 0.55 | |
Project 2 (Theme park) | The overall security level of the project | Medium (0.5) (See Table 3) |
The probability that the malicious insider who launches a cyberattack is detected | 0.49 | |
The probability that the malicious insider who uses authentication is detected | 0.55 |
File Type | File Accessibility Level (Project 1) | File Accessibility Level (Project 2) |
---|---|---|
Structural design file | Low | Very low |
Resource management file | High | Medium |
File Type | Value of the File to a Potential Malicious Insider (Project 1) | Value of the File to a Potential Malicious Insider (Project 2) |
---|---|---|
Structural design file | Critical | Critical |
Resource management file | Medium | High |
File Type | Criticality of the File (for the Project) | Payoff Due to Discovery of Malicious Insider Identity or Data Protection (ω) | Value of the File to the Malicious Insider | Payoff Corresponding to Compromised Data (β) | File Accessibility Level | Project Security Level | File Security Level | Malicious Insider’s Expertise Level | Cost of Cyberattack (Ccyb) | Bayesian Nash Equilibrium (BNE) | ||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Cybersecurity Attribute | Criticality | ω | Average ω | |||||||||
Structural Design File | Confidentiality | Critical | 0.95 | 0.82 | Critical | 0.95 | Low: 0.7 | Medium: 0.5 | (0.5 × 0.7) = 0.35 | Advanced beginner: 0.3 | Max{0.35 − 0.3, 0} = 0.05 | A |
Integrity | Critical | 0.95 | ||||||||||
Availability | Medium | 0.55 | ||||||||||
Resource Management File | Confidentiality | Low | 0.2 | 0.2 | Medium | 0.5 | High: 0.3 | (0.5 × 0.3) = 0.15 | Max{0.15 − 0.3, 0} = 0 | A | ||
Integrity | Low | 0.2 | ||||||||||
Availability | Low | 0.2 |
File Type | Criticality of the File (for the Project) | Payoff Due to Discovery of Malicious Insider Identity or Data Protection (ω) | Value of the File to the Malicious Insider | Payoff Corresponding to Compromised Data (β) | File Accessibility Level | Project Security Level | File Security Level | Malicious Insider’s Expertise Level | Cost of Cyberattack (Ccyb) | Bayesian Nash Equilibrium (BNE) | ||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Cybersecurity Attribute | Criticality | ω | Average ω | |||||||||
Structural Design File | Confidentiality | Critical | 0.95 | 0.82 | Critical | 0.95 | Very low: 0.9 | Medium: 0.5 | (0.5 × 0.9) = 0.45 | Advanced beginner: 0.3 | Max{0.45 − 0.3, 0} = 0.15 | B |
Integrity | Critical | 0.95 | ||||||||||
Availability | Medium | 0.55 | ||||||||||
Resource Management File | Confidentiality | High | 0.8 | 0.4 | High | 0.8 | Medium: 0.5 | (0.5 × 0.5) = 0.25 | Max{0.15 − 0.3, 0} = 0 | A | ||
Integrity | Low | 0.2 | ||||||||||
Availability | Low | 0.2 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Lalropuia, K.; Goyal, S.; García de Soto, B.; Yao, D.; Sonkor, M.S. Mitigating Malicious Insider Threats to Common Data Environments in the Architecture, Engineering, and Construction Industry: An Incomplete Information Game Approach. J. Cybersecur. Priv. 2025, 5, 5. https://doi.org/10.3390/jcp5010005
Lalropuia K, Goyal S, García de Soto B, Yao D, Sonkor MS. Mitigating Malicious Insider Threats to Common Data Environments in the Architecture, Engineering, and Construction Industry: An Incomplete Information Game Approach. Journal of Cybersecurity and Privacy. 2025; 5(1):5. https://doi.org/10.3390/jcp5010005
Chicago/Turabian StyleLalropuia, KC, Sanjeev Goyal, Borja García de Soto, Dongchi Yao, and Muammer Semih Sonkor. 2025. "Mitigating Malicious Insider Threats to Common Data Environments in the Architecture, Engineering, and Construction Industry: An Incomplete Information Game Approach" Journal of Cybersecurity and Privacy 5, no. 1: 5. https://doi.org/10.3390/jcp5010005
APA StyleLalropuia, K., Goyal, S., García de Soto, B., Yao, D., & Sonkor, M. S. (2025). Mitigating Malicious Insider Threats to Common Data Environments in the Architecture, Engineering, and Construction Industry: An Incomplete Information Game Approach. Journal of Cybersecurity and Privacy, 5(1), 5. https://doi.org/10.3390/jcp5010005