Title :
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Author :
Yali Liu ; Corbett, Cherita ; Ken Chiang ; Archibald, R. ; Mukherjee, Biswanath ; Ghosal, Dipak
Author_Institution :
Dept. of Electr. & Comput. Eng., Univ. of California, Davis, CA
Abstract :
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizations mitigate the loss of sensitive information and also potentially protect against future attacks. Within the broader scope of mitigating insider threat, we focus on detecting exfiltration of sensitive data through a protected network. We propose a multilevel framework called SIDD (Sensitive Information Dissemination Detection) system which is a high-speed transparent network bridge located at the edge of the protected network. SIDD consists of three main components: 1) network-level application identification, 2) content signature generation and detection, and 3) covert communication detection. Further, we introduce a model implementation of the key components, demonstrating how our system can be deployed. Our approach is based on the application of statistical and signal processing techniques on traffic flow to generate signatures and/or extract features for classification purposes. The proposed framework aims to address methods to detect, deter and prevent deliberate and unintended distribution of sensitive content outside the organization using the organization´s system and network resources by a trusted insider.
Keywords :
data privacy; feature extraction; information dissemination; information filtering; intranets; pattern classification; security of data; steganography; telecommunication security; telecommunication traffic; SIDD system; content signature generation; covert communication detection; feature extraction; high-speed transparent network bridge; insider threat detection; insider threat mitigation; network protection; network-level application identification; organizational information protection strategy; sensitive data exfiltration detection framework; sensitive information dissemination detection system; signal processing technique; statistical technique; steganography method; traffic flow classification; Communication system security; Data engineering; Data security; Feature extraction; Leak detection; Object detection; Protection; Signal generators; Signal processing; Telecommunication traffic;
Conference_Titel :
System Sciences, 2009. HICSS '09. 42nd Hawaii International Conference on
Conference_Location :
Big Island, HI
Print_ISBN :
978-0-7695-3450-3
DOI :
10.1109/HICSS.2009.390