Learning from Access Log to Mitigate Insider Threats
As the quantity of data collected, stored, and processed in information systems has grown, so too have insider threats. This type of threat is realized when authorized individuals misuse their privileges to violate privacy or security policies. Over the past several decades, various technologies hav...
Main Author: | |
---|---|
Other Authors: | |
Format: | Others |
Language: | en |
Published: |
VANDERBILT
2016
|
Subjects: | |
Online Access: | http://etd.library.vanderbilt.edu/available/etd-03152016-201532/ |
id |
ndltd-VANDERBILT-oai-VANDERBILTETD-etd-03152016-201532 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-VANDERBILT-oai-VANDERBILTETD-etd-03152016-2015322016-03-18T17:31:12Z Learning from Access Log to Mitigate Insider Threats Zhang, Wen Computer Science As the quantity of data collected, stored, and processed in information systems has grown, so too have insider threats. This type of threat is realized when authorized individuals misuse their privileges to violate privacy or security policies. Over the past several decades, various technologies have been introduced to mitigate the insider threat, which can be roughly partitioned into two categories: 1) prospective and 2) retrospective. Prospective technologies are designed to specify and manage a userâs rights, such that misuse can be detected and prevented before it transpires. Conversely, retrospective technologies permit users to invoke privileges aim, but investigate the legitimacy of such actions after the fact. Despite the existence of such strategies, administrators need to answer several critical questions to put them into practice. First, given a specific circumstance, which type of strategy (i.e., prospective vs. retrospective) should be adopted? Second, given the type of strategy, which is the best approach to support it in an operational manner? Existing approaches addressing them neglect that the data captured by information systems may be able to inform the decision making. As such, the overarching goal of this dissertation is to investigate how best to answer these questions using data-driven approaches. This dissertation makes three technical contributions. The first contribution is in the introduction of a novel approach to quantify tradeoffs for prospective and retrospective strategies, under which each strategy is translated into a classification model, whereby the misclassification costs for each model are compared to facilitate decision support. This dissertation then introduces several data-driven approaches to realize the strategies. The second contribution is for prospective strategies, with a specific focus on role-based access control (RBAC). This dissertation introduces an approach to evolve an existing RBAC based on evidence in an access log, which relies on a strategy to promote roles from candidates. The third contribution is for retrospective strategies, whereby this dissertation introduces an auditing framework that can leverage workflow information to facilitate misuse detection. These methods are empirically validated in three months of access log (million accesses) derived from a real-world information system. Carl Gunter Jules White Yuan Xue Bradley Malin Gautam Biswas VANDERBILT 2016-03-17 text application/pdf http://etd.library.vanderbilt.edu/available/etd-03152016-201532/ http://etd.library.vanderbilt.edu/available/etd-03152016-201532/ en unrestricted I hereby certify that, if appropriate, I have obtained and attached hereto a written permission statement from the owner(s) of each third party copyrighted matter to be included in my thesis, dissertation, or project report, allowing distribution as specified below. I certify that the version I submitted is the same as that approved by my advisory committee. I hereby grant to Vanderbilt University or its agents the non-exclusive license to archive and make accessible, under the conditions specified below, my thesis, dissertation, or project report in whole or in part in all forms of media, now or hereafter known. I retain all other ownership rights to the copyright of the thesis, dissertation or project report. I also retain the right to use in future works (such as articles or books) all or part of this thesis, dissertation, or project report. |
collection |
NDLTD |
language |
en |
format |
Others
|
sources |
NDLTD |
topic |
Computer Science |
spellingShingle |
Computer Science Zhang, Wen Learning from Access Log to Mitigate Insider Threats |
description |
As the quantity of data collected, stored, and processed in information systems has grown, so too have insider threats. This type of threat is realized when authorized individuals misuse their privileges to violate privacy or security policies. Over the past several decades, various technologies have been introduced to mitigate the insider threat, which can be roughly partitioned into two categories: 1) prospective and 2) retrospective. Prospective technologies are designed to specify and manage a userâs rights, such that misuse can be detected and prevented before it transpires. Conversely, retrospective technologies permit users to invoke privileges aim, but investigate the legitimacy of such actions after the fact.
Despite the existence of such strategies, administrators need to answer several critical questions to put them into practice. First, given a specific circumstance, which type of strategy (i.e., prospective vs. retrospective) should be adopted? Second, given the type of strategy, which is the best approach to support it in an operational manner? Existing approaches addressing them neglect that the data captured by information systems may be able to inform the decision making. As such, the overarching goal of this dissertation is to investigate how best to answer these questions using data-driven approaches.
This dissertation makes three technical contributions. The first contribution is in the introduction of a novel approach to quantify tradeoffs for prospective and retrospective strategies, under which each strategy is translated into a classification model, whereby the misclassification costs for each model are compared to facilitate decision support. This dissertation then introduces several data-driven approaches to realize the strategies. The second contribution is for prospective strategies, with a specific focus on role-based access control (RBAC). This dissertation introduces an approach to evolve an existing RBAC based on evidence in an access log, which relies on a strategy to promote roles from candidates. The third contribution is for retrospective strategies, whereby this dissertation introduces an auditing framework that can leverage workflow information to facilitate misuse detection. These methods are empirically validated in three months of access log (million accesses) derived from a real-world information system.
|
author2 |
Carl Gunter |
author_facet |
Carl Gunter Zhang, Wen |
author |
Zhang, Wen |
author_sort |
Zhang, Wen |
title |
Learning from Access Log to Mitigate Insider Threats |
title_short |
Learning from Access Log to Mitigate Insider Threats |
title_full |
Learning from Access Log to Mitigate Insider Threats |
title_fullStr |
Learning from Access Log to Mitigate Insider Threats |
title_full_unstemmed |
Learning from Access Log to Mitigate Insider Threats |
title_sort |
learning from access log to mitigate insider threats |
publisher |
VANDERBILT |
publishDate |
2016 |
url |
http://etd.library.vanderbilt.edu/available/etd-03152016-201532/ |
work_keys_str_mv |
AT zhangwen learningfromaccesslogtomitigateinsiderthreats |
_version_ |
1718208566110715904 |