Application or Case Based Reasoning System for Identifying Insiders Threat Behavior in Telecom: The Case of Ethio Telecom
No Thumbnail Available
Date
2019-06
Authors
Journal Title
Journal ISSN
Volume Title
Publisher
Addis Ababa University
Abstract
On this research work the researcher has made an attempt on applying case-based reasoning system
in depicting employee's behavior towards potential (fraud to be committed by identifying at risk
employees and recommending possible related fraud types to be committed, by using human
observable behaviors. The required knowledge was acquired from two group of experts, seven
previously investigated insider cases, document analysis and other relevant information through a
six-point Likert scale questionnaire survey. Investigated cases were gather from Ethio telecom
legal department and information science department. The domain experts were selected from
Addis Ababa University. FORE attorney general and self-employed personnel, using purposive
sampling.
For modeling purpose of the acquired knowledge, hierarchical tree modeling technique were used.
Attributes that arc relevant and have direct impact on the decision were selected and the case
structure formulated.
The prototype is developed using the Object-Oriented framework JCOLIBRII . 1. The system has
the capability in retrieving, reusing, revising, and retaining new cases. And here nearest neighbor
retrieval algorithm was used while the system retrieves cases from the knowledge base. In order
to assure the CBR system has meet the requirement needed, evaluation was conducted on both the
system performance and user acceptance test.
The overall evaluation result shows that the case based reasoning prototype for insider threat
mitigation is very encouraging as the retrieval performance of the prototype registers an average
value of 82. 14% precision and 82.85 % recall with average accuracy of 94.90%. And also, the
system has registered an average grade of "very good" in user satisfaction test res ult.
Generally, the work has achieved its objective by developing the expected prototype with an
encouraging system performance and user acceptance test result on designing knowledge-based
system for insider threat mitigation using human observable behaviors.
Description
Keywords
Threat Behavior in Telecom: The Case of Ethio Telecom