DocumentCode :
1831534
Title :
Detecting data exfiltration by integrating information across layers
Author :
Sharma, Parmanand ; Joshi, Akanksha ; Finin, Tim
Author_Institution :
Comput. Sci. & Electr. Eng., Univ. of Maryland, Baltimore County, Baltimore, MD, USA
fYear :
2013
fDate :
14-16 Aug. 2013
Firstpage :
309
Lastpage :
316
Abstract :
Data exfiltration is the unauthorized leakage of confidential data from a system. Unlike intrusions that seek to overtly disable or damage a system, it is particularly hard to detect because it uses a variety of low/slow vectors and advanced persistent threats (APTs). It is often assisted (intentionally or not) by an insider who might be an employee who downloads a trojan or uses a hardware component that has been tampered with or acquired from an unreliable source. Conventional scan and test based detection approaches work poorly, especially for hardware with embedded trojans. We describe a framework to detect potential exfiltration events that actively monitors of a set of key parameters that cover the entire stack, from hardware to the application layer. An attack alert is generated only if several monitors detect suspicious activity within a short temporal window. The cross-layer monitoring and integration helps ensure accurate alerts with fewer false positives and makes designing a successful attack more difficult.
Keywords :
invasive software; advanced persistent threats; application layer; attack alert; confidential data; cross-layer integration; cross-layer monitoring; data exfiltration; test based detection approaches; trojan; unauthorized leakage; Hardware; Intrusion detection; Memory management; Monitoring; Resource description framework; Sensors; Universal Serial Bus;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Reuse and Integration (IRI), 2013 IEEE 14th International Conference on
Conference_Location :
San Francisco, CA
Type :
conf
DOI :
10.1109/IRI.2013.6642487
Filename :
6642487
Link To Document :
بازگشت