Knowing who to watch: accumulating evidence of subtle attacks

dc.contributor.authorChivers, H.
dc.contributor.authorClark, J. A.
dc.contributor.authorNobles, P.
dc.contributor.authorShaikh, S. A.
dc.contributor.authorChen, H.
dc.date.accessioned2009-09-02T08:46:19Z
dc.date.available2009-09-02T08:46:19Z
dc.date.issued2010-09-23T08:46:19Z
dc.description© Springer Science+Business Media, LLC 2010
dc.description.abstractInsider attacks are often subtle and slow, or preceded by behavioral indicators such as organizational rule-breaking which provide the potential for early warning of malicious intent; both these cases pose the problem of identifying attacks from limited evidence contained within a large volume of event data collected from multiple sources over a long period. This paper proposes a scalable solution to this problem by maintaining long-term estimates that individuals or nodes are attackers, rather than retaining event data for post-facto analysis. These estimates are then used as triggers for more detailed investigation. We identify essential attributes of event data, allowing the use of a wide range of indicators, and show how to apply Bayesian statistics to maintain incremental estimates without global updating. The paper provides a theoretical account of the process, a worked example, and a discussion of its practical implications. The work includes examples that identify subtle attack behaviour in subverted network nodes, but the process is not network-specific and is capable of integrating evidence from other sources, such as behavioral indicators, document access logs and financial records, in addition to events identified by network monitoring.en_UK
dc.identifier.citationChivers H, Clark JA, Nobles P, et al., (2013) Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise. Information Systems Frontiers, Volume 15, March 2013, pp. 17-34
dc.identifier.urihttps://doi.org/10.1007/s10796-010-9268-7
dc.identifier.urihttp://hdl.handle.net/1826/3637
dc.language.isoenen_UK
dc.rights© Springer Science+Business Media, LLC 2010
dc.subjectInsider
dc.subjectBehavioural
dc.subjectSubtle attack
dc.subjectIntrusion detection
dc.subjectSecurity
dc.subjectEvidence
dc.subjectNetwork
dc.subjectBayesian
dc.titleKnowing who to watch: accumulating evidence of subtle attacksen_UK
dc.typeArticleen_UK

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Knowing_who_to_watch-2010.pdf
Size:
614.03 KB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.88 KB
Format:
Item-specific license agreed upon to submission
Description: