• DocumentCode
    1707741
  • Title

    Molehunt: near-line semantic activity tracing

  • Author

    Wolthusen, Stephen D.

  • Author_Institution
    Fraunhofer-IGD, Germany
  • fYear
    2005
  • Firstpage
    410
  • Lastpage
    418
  • Abstract
    This paper discusses threats posed by low granularity in access to confidential (classified) data typically found at lower protection levels, namely direct access beyond need to know and the correlation of materials yielding more sensitive aggregate data by both insider threats and malware, an area of particular concern for intelligence analysis. It is argued that while active security controls at both the procedural and technical level are currently not pragmatically feasible, near-line semantic monitoring particularly at the file system but also at the network level can provide capabilities to detect anomalous and also directed malicious activity. A mechanism for implementing the tracing and monitoring mechanism on an COTS operating system is described.
  • Keywords
    data privacy; operating systems (computers); security of data; Molehunt; active security control; anomalous activity detection; classified data; confidential data; data access; data protection; intelligence analysis; malicious activity detection; malware; near-line semantic activity tracing; near-line semantic monitoring; operating system; sensitive aggregate data; Aggregates; Control systems; Data security; File systems; Information systems; Monitoring; Multilevel systems; National security; Operating systems; Protection;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Assurance Workshop, 2005. IAW '05. Proceedings from the Sixth Annual IEEE SMC
  • Print_ISBN
    0-7803-9290-6
  • Type

    conf

  • DOI
    10.1109/IAW.2005.1495981
  • Filename
    1495981