The optimization of situational awareness for insider threat detection

  • Kenneth Brancik*
  • , Gabriel Ghinita
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

15 Citations (Scopus)

Abstract

In recent years, organizations ranging from defense and other government institutions to commercial enterprises, research labs, etc., have witnessed an increasing amount of sophisticated insider attacks that manage to bypass existing security controls. Insider threats are staged by either disgruntled employees, or employees engaged in malicious activities such as industrial espionage. The objectives of such threats range from sabotage, e.g., in order to disrupt the completion of a project, to exfiltration of sensitive data such as trade secrets, patents, etc. Insiders are often skilled and motivated individuals with good knowledge of internal security measures in the organization. They devise effective and carefully planned attacks, prepared over long periods of time and customized to inflict maximum damage. Such attacks are difficult to detect and protect against, because insiders have the proper credentials to access services and systems within the organization, and possess knowledge that may allow them to deceive network defense controls. As a result, a large number of hosts may be taken over, allowing malicious insiders to maintain control over the network even after leaving the organization. The objective of this study is to identify a high-level architecture and mechanisms for early detection and protection against insider threats. One of the main aspects we focus on is preventing data exfiltration, which is known to cost billions of dollars in losses annually. The goal is to either (i) detect attacks as they occur and prevent insiders from gaining control over the network, or (ii) detect early hosts and services that are compromised such that malware is prevented from spreading/morphing, hence insiders are no longer able to control the network or to exfiltrate sensitive data. We envision a data-intensive approach that leverages large amounts of events collected from a diverse set of sources such as network sensors, intrusion detection systems, service logs, as well as known attack databases (e.g., virus signature collections, digital artifacts), security and service logs, etc. The proposed approach aims to study and understand the relationships and correlations between events, with the purpose of detecting anomalous and/or malicious behavior.

Original languageEnglish
Title of host publicationCODASPY'11 - Proceedings of the 1st ACM Conference on Data and Application Security and Privacy
Pages231-235
Number of pages5
DOIs
Publication statusPublished - 2011
Externally publishedYes
Event1st ACM Conference on Data and Application Security and Privacy, CODASPY'11 - San Antonio, TX, United States
Duration: 21 Feb 201123 Feb 2011

Publication series

NameCODASPY'11 - Proceedings of the 1st ACM Conference on Data and Application Security and Privacy

Conference

Conference1st ACM Conference on Data and Application Security and Privacy, CODASPY'11
Country/TerritoryUnited States
CitySan Antonio, TX
Period21/02/1123/02/11

Keywords

  • Data exfiltration
  • Insider threat

Fingerprint

Dive into the research topics of 'The optimization of situational awareness for insider threat detection'. Together they form a unique fingerprint.

Cite this