Title :
Insider abuse comprehension through capability acquisition graphs
Author :
Mathew, Sunu ; Upadhyaya, Shambhu ; Ha, Duc ; Ngo, Hung Q.
Author_Institution :
Dept. of Comput. Sci. & Eng., State Univ. of New York at Buffalo, Buffalo, NY
fDate :
June 30 2008-July 3 2008
Abstract :
Insider attacks constitute one of the most potent, yet difficult to detect threats to information security in the cyber-domain. Malicious actions perpetrated by privileged insiders usually circumvent intrusion detection systems (IDS) and other mechanisms designed to detect and prevent unauthorized activity. In this paper, we present an architectural framework and technique to aid in situation awareness of insider threats in a networked computing environment such as a corporate network. Individual actions by users are analyzed using a theoretical model called a Capability Acquisition Graph (CAG) to evaluate their cumulative effect and detect possible violations. Our approach is based on periodic evaluation of the privileges that users accumulate with respect to critical information assets during their workflow. A static analysis tool called Information-Centric Modeler and Auditor Program (ICMAP) is used to periodically construct CAGs which are then analyzed to uncover possible attacks. The process is demonstrated by considering an information process cycle from the real-world.
Keywords :
graph theory; security of data; abuse comprehension; capability acquisition graph; information security; information-centric modeler and auditor program; insider threats; intrusion detection systems; networked computing environment; static analysis tool; unauthorized activity; Capability Acquisition Graph; Insider threat; Situation awareness;
Conference_Titel :
Information Fusion, 2008 11th International Conference on
Conference_Location :
Cologne
Print_ISBN :
978-3-8007-3092-6
Electronic_ISBN :
978-3-00-024883-2