Skip to main content
Top
Published in: Information Systems Frontiers 1/2013

01-03-2013

Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise

Authors: Howard Chivers, John A. Clark, Philip Nobles, Siraj A. Shaikh, Hao Chen

Published in: Information Systems Frontiers | Issue 1/2013

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Insider attacks are often subtle and slow, or preceded by behavioral indicators such as organizational rule-breaking which provide the potential for early warning of malicious intent; both these cases pose the problem of identifying attacks from limited evidence contained within a large volume of event data collected from multiple sources over a long period. This paper proposes a scalable solution to this problem by maintaining long-term estimates that individuals or nodes are attackers, rather than retaining event data for post-facto analysis. These estimates are then used as triggers for more detailed investigation. We identify essential attributes of event data, allowing the use of a wide range of indicators, and show how to apply Bayesian statistics to maintain incremental estimates without global updating. The paper provides a theoretical account of the process, a worked example, and a discussion of its practical implications. The work includes examples that identify subtle attack behaviour in subverted network nodes, but the process is not network-specific and is capable of integrating evidence from other sources, such as behavioral indicators, document access logs and financial records, in addition to events identified by network monitoring.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Bace, R., & Mell, P. (2001). Intrusion detection systems (IDS). Tech. Rep. SP 800-31, National Institute of Standards and Technology (NIST). Bace, R., & Mell, P. (2001). Intrusion detection systems (IDS). Tech. Rep. SP 800-31, National Institute of Standards and Technology (NIST).
go back to reference Band, S. R., Cappelli, D. M., Fischer, L. F., Moore, A. P., Shaw, E. D., & Trzeciak, R. F. (2006). Comparing insider it sabotage and espionage: A model-based analysis. Tech. rep., Carnegie Mellon Software Engineering Institute. Band, S. R., Cappelli, D. M., Fischer, L. F., Moore, A. P., Shaw, E. D., & Trzeciak, R. F. (2006). Comparing insider it sabotage and espionage: A model-based analysis. Tech. rep., Carnegie Mellon Software Engineering Institute.
go back to reference Brackney, R. C., & Anderson, R. H. (2004). Understanding the insider threat. Tech. Rep. Proceedings of March 2004 Workshop, RAND National Security Research Division. Brackney, R. C., & Anderson, R. H. (2004). Understanding the insider threat. Tech. Rep. Proceedings of March 2004 Workshop, RAND National Security Research Division.
go back to reference Bradford, P. G., Brown, M., Perdue, J., & Self, B. (2004). Towards proactive computer-system forensics. In International conference on information technology: Coding and computing (ITCC 2004) (pp. 648–652). IEEE Computer Society. Bradford, P. G., Brown, M., Perdue, J., & Self, B. (2004). Towards proactive computer-system forensics. In International conference on information technology: Coding and computing (ITCC 2004) (pp. 648–652). IEEE Computer Society.
go back to reference Buford, J. F., Lewis, L., & Jakobson, G. (2008). Insider threat detection using situation-aware MAS. In 11th international conference on information fusion (pp. 1–8). Cologne, Germany: IEEE Xplore. Buford, J. F., Lewis, L., & Jakobson, G. (2008). Insider threat detection using situation-aware MAS. In 11th international conference on information fusion (pp. 1–8). Cologne, Germany: IEEE Xplore.
go back to reference Caputo, D. D., Stephens, G. D., & Maloof, M. A. (2009). Detecting insider theft of trade secrets. IEEE Security & Privacy, 7(6), 14–21.CrossRef Caputo, D. D., Stephens, G. D., & Maloof, M. A. (2009). Detecting insider theft of trade secrets. IEEE Security & Privacy, 7(6), 14–21.CrossRef
go back to reference CERT Incident Note (1998). IN-98-05: Probes with spoofed IP addresses. CERT Incident Note (1998). IN-98-05: Probes with spoofed IP addresses.
go back to reference Chebrolua, S., Abrahama, A., & Thomas, J. P. (2004). Feature deduction and ensemble design of intrusion detection systems. Computers & Security, 24(4), 295–307.CrossRef Chebrolua, S., Abrahama, A., & Thomas, J. P. (2004). Feature deduction and ensemble design of intrusion detection systems. Computers & Security, 24(4), 295–307.CrossRef
go back to reference Chivers, H., Nobles, P., Shaikh, S. A., Clark, J. A., & Chen, H. (2009). Accumulating evidence of insider attacks. In The 1st international workshop on managing insider security threats (MIST 2009) (In conjunction with IFIPTM 2009). CEUR Workshop Proceedings. Chivers, H., Nobles, P., Shaikh, S. A., Clark, J. A., & Chen, H. (2009). Accumulating evidence of insider attacks. In The 1st international workshop on managing insider security threats (MIST 2009) (In conjunction with IFIPTM 2009). CEUR Workshop Proceedings.
go back to reference Colombe, J. B., & Stephens, G. (2004). Statistical profiling and visualization for detection of malicious insider attacks on computer networks. In The 2004 ACM workshop on visualization and data mining for computer security (pp. 138–142). ACM Press. Colombe, J. B., & Stephens, G. (2004). Statistical profiling and visualization for detection of malicious insider attacks on computer networks. In The 2004 ACM workshop on visualization and data mining for computer security (pp. 138–142). ACM Press.
go back to reference Eberle, W., & Holder, L. (2009). Insider threat detection using graph-based approaches. In Cybersecurity applications & technology conference for homeland security (CATCH) (pp. 237–241). IEEE Computer Society. Eberle, W., & Holder, L. (2009). Insider threat detection using graph-based approaches. In Cybersecurity applications & technology conference for homeland security (CATCH) (pp. 237–241). IEEE Computer Society.
go back to reference Goodin, D. (2007). TJX breach was twice as big as admitted, banks say. The Register. Goodin, D. (2007). TJX breach was twice as big as admitted, banks say. The Register.
go back to reference Heberlein, T. (2002). Tactical operations and strategic intelligence: Sensor purpose and placement. Tech. Rep. TR-2002-04.02, Net Squared, Inc. Heberlein, T. (2002). Tactical operations and strategic intelligence: Sensor purpose and placement. Tech. Rep. TR-2002-04.02, Net Squared, Inc.
go back to reference Herbig, K. L., & Wiskoff, M. F. (2002). Espionage against the united states by American citizens 1947–2001. Tech. Rep. 02-05, Defense Personnel Security Research Center (PERSEREC). Herbig, K. L., & Wiskoff, M. F. (2002). Espionage against the united states by American citizens 1947–2001. Tech. Rep. 02-05, Defense Personnel Security Research Center (PERSEREC).
go back to reference Nguyen, N., Reiher, P., & Kuenning, G. H. (2003). Detecting insider threats by monitoring system call activity. In 2003 IEEE Workshop on information assurance (pp. 18–20). IEEE Computer Society, United States Military Academy, West Point. Nguyen, N., Reiher, P., & Kuenning, G. H. (2003). Detecting insider threats by monitoring system call activity. In 2003 IEEE Workshop on information assurance (pp. 18–20). IEEE Computer Society, United States Military Academy, West Point.
go back to reference Randazzo, M.R., Cappelli, D., Keeney, M., Moore, A., & Kowalski, E. (2004). U.S. secret service and CERT coordination center/SEI insider threat study: Illicit cyber activity in the banking and finance sector. Tech. rep., Software Engineering Institute, Carnegie Mellon University. Randazzo, M.R., Cappelli, D., Keeney, M., Moore, A., & Kowalski, E. (2004). U.S. secret service and CERT coordination center/SEI insider threat study: Illicit cyber activity in the banking and finance sector. Tech. rep., Software Engineering Institute, Carnegie Mellon University.
go back to reference Russell, S., & Norvig, P. (2010). Artificial intelligence (3rd ed.). Prentice Hall. Russell, S., & Norvig, P. (2010). Artificial intelligence (3rd ed.). Prentice Hall.
go back to reference Spitzner, L. (2003). Honeypots: Catching the insider threat. In 19th annual computer security applications conference (ACSAC ’03) (pp. 170–179). IEEE Computer Society. Spitzner, L. (2003). Honeypots: Catching the insider threat. In 19th annual computer security applications conference (ACSAC ’03) (pp. 170–179). IEEE Computer Society.
go back to reference Staniford, S., Hoagland, J. A., & McAlerney, J. M. (2002). Practical automated detection of stealthy portscans. Journal of Computer Security, 10(1/2), 105–136. Staniford, S., Hoagland, J. A., & McAlerney, J. M. (2002). Practical automated detection of stealthy portscans. Journal of Computer Security, 10(1/2), 105–136.
go back to reference Wells, J. T. (2008). Principles of fraud examination (2nd ed.). Wiley. Wells, J. T. (2008). Principles of fraud examination (2nd ed.). Wiley.
Metadata
Title
Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise
Authors
Howard Chivers
John A. Clark
Philip Nobles
Siraj A. Shaikh
Hao Chen
Publication date
01-03-2013
Publisher
Springer US
Published in
Information Systems Frontiers / Issue 1/2013
Print ISSN: 1387-3326
Electronic ISSN: 1572-9419
DOI
https://doi.org/10.1007/s10796-010-9268-7

Other articles of this Issue 1/2013

Information Systems Frontiers 1/2013 Go to the issue

Premium Partner