A generic architecture for insider misuse monitoring in IT systems

نویسنده

  • Aung Htike Phyo
چکیده

A Generic Architecture for Insider Misuse Monitoring in I T Systems Aung Htike Phyo BSc (Hons) Intrusion Detection Systems (IDS) have been widely deployed within many organisations' IT nenvorks to delect network penetration attacks by outsiders and privilege escalation attacks by insiders. However, traditional IDS are ineffective for detecting o f abuse o f legitimate privileges by authorised users within the organisation i.e. the detection o f misfeasance. In essence insider IT abuse does not violate system level controls, yet violates acceptable usage policy, business controls, or code o f conduct defined by the organisation. However, the acceptable usage policy can vary from one organisation to another, and the acceptability o f user activities can also change depending upon the user(s), application, machine, data, and other contextual conditions associated with the entities involved. The fact that the perpetrators are authorised users and that the insider misuse activities do not violate system level controls makes detection o f insider abuse more complicated than detection o f attacks by outsiders. The overall aim o f the research is to determine novel methods by which monitoring and detection may be improved to enable successful detection o f insider IT abuse. The discussion begins with a comprehensive investigation o f insider IT misuse, encompassing the breadth and scale o f the problem. Consideration is then given to the sufficiency o f existing safeguards, with the conclusion that they provide an inadequate basis for detecting many o f the problems. This finding is used as the justification for considering research into alternative approaches. The realisation o f the research objective includes the development o f a taxonomy for identification o f various levels within the system from which the relevant data associated with each type o f misuse can be collected, and formulation o f a checklist for identification o f applications that requires misfeasor monitoring. Based upon this foundation a novel architecture for monitoring o f insider IT misuse, has been designed. The design offers new analysis procedures to be added, while providing methods to include relevant contextual parameters from dispersed systems for analysis and reference. The proposed system differs from existing IDS in the way that it focuses on detecting contextual misuse o f authorised privileges and legitimate operations, rather than detecting exploitation o f network protocols and system level \ailnerabilities. The main concepts o f the new architecture were validated through a proof-of-concept prototype system. A number o f case scenarios were used to demonstrate the validity o f analysis procedures developed and how the contextual data from dispersed databases can be used for analysis o f various types o f insider activities. This helped prove that the existing detection technologies can be adopted for detection o f insider IT misuse, and that the research has thus provided valuable contribution to the domain.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Future study of Description System Architecture Approaches with Emphasis on Strategic Management

Systems Architecture is a generic discipline to handle objects (existing or to be created) called systems, in a way that supports reasoning about the structural properties of these objects. Systems Architecture is a response to the conceptual and practical difficulties of the description and the design of complex systems. Systems Architecture is a generic discipline to handle objects (existin...

متن کامل

An insider misuse threat detection and prediction language

An Insider Misuse Threat Detection and Prediction Language Georgios Vasilios Magklaras BSc (Hons) MPhil Numerous studies indicate that amongst the various types of security threats, the problem of insider misuse of IT systems can have serious consequences for the health of computing infrastructures. Although incidents of external origin are also dangerous, the insider IT misuse problem is diffi...

متن کامل

The Insider Misuse Threat Survey: Investigating IT misuse from legitimate users

The majority of computer security methods tend to focus upon the detection and prevention of security incidents of external origin. However, a number of surveys and media reports indicate the dangers of legitimate user misuse of IT resources, a separate category of computer security incidents with serious consequences for the integrity, privacy and availability of computer systems and networks....

متن کامل

A Framework For Monitoring Insider Misuse Of It Applications

Many security incidents involve legitimate users who misuse their existing privileges, such that they have the system-level right to perform an action, but not the moral or ethical rights to do so. Current Intrusion Detection Systems are ineffective in this context, because they do not have knowledge of user responsibilities, the normal working scope for a particular position, or the separation...

متن کامل

LUARM – An audit engine for insider misuse detection

'Logging User Actions in Relational Mode' (LUARM) is an open source audit engine for Linux. It provides a near real-time snapshot of a number of user action data such as file access, program execution and network endpoint user activities, all organized in easily searchable relational tables. LUARM attempts to solve two fundamental problems of the insider IT misuse domain. The first concerns the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007