Application or Case Based Reasoning System for Identifying Insiders Threat Behavior in Telecom: The Case of Ethio Telecom

No Thumbnail Available

Date

2019-06

Journal Title

Journal ISSN

Volume Title

Publisher

Addis Ababa University

Abstract

On this research work the researcher has made an attempt on applying case-based reasoning system in depicting employee's behavior towards potential (fraud to be committed by identifying at risk employees and recommending possible related fraud types to be committed, by using human observable behaviors. The required knowledge was acquired from two group of experts, seven previously investigated insider cases, document analysis and other relevant information through a six-point Likert scale questionnaire survey. Investigated cases were gather from Ethio telecom legal department and information science department. The domain experts were selected from Addis Ababa University. FORE attorney general and self-employed personnel, using purposive sampling. For modeling purpose of the acquired knowledge, hierarchical tree modeling technique were used. Attributes that arc relevant and have direct impact on the decision were selected and the case structure formulated. The prototype is developed using the Object-Oriented framework JCOLIBRII . 1. The system has the capability in retrieving, reusing, revising, and retaining new cases. And here nearest neighbor retrieval algorithm was used while the system retrieves cases from the knowledge base. In order to assure the CBR system has meet the requirement needed, evaluation was conducted on both the system performance and user acceptance test. The overall evaluation result shows that the case based reasoning prototype for insider threat mitigation is very encouraging as the retrieval performance of the prototype registers an average value of 82. 14% precision and 82.85 % recall with average accuracy of 94.90%. And also, the system has registered an average grade of "very good" in user satisfaction test res ult. Generally, the work has achieved its objective by developing the expected prototype with an encouraging system performance and user acceptance test result on designing knowledge-based system for insider threat mitigation using human observable behaviors.

Description

Keywords

Threat Behavior in Telecom: The Case of Ethio Telecom

Citation