Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1413140.1413159acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

Detecting sensitive data exfiltration by an insider attack

Published: 12 May 2008 Publication History

Abstract

Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizations avoid the loss of sensitive information and also potentially protect against future attacks. Within the broader scope of mitigating insider threat, we focus on detecting exfiltration of sensitive data through the high speed network. We propose a multilevel approach that consists of three main components: 1) network level application identification, 2) content signature generation and detection, and 3) covert communication detection. The key scientific approach used for all the above components is applying statistical and signal processing techniques on network traffic to generate signatures and/or extract features for classification purposes. We provide a summary of the approaches used in network level application identification and content signature generation and detection and briefly describe our approach in detecting covert communications. This paper touches on these issues and outlines overall directions for our research.

Supplementary Material

Related slides. (a16-liu-slides.pdf)
Slide presentation for "Detecting sensitive data exfiltration by an insider attack"

References

[1]
Burrus, C. S., Gopinath, R. A., and Guo, H. 1998 Introduction to wavelets and wavelets transforms, a primer. Upper Saddle River, Prentice Hall.
[2]
Nguyen, T. T. T and Armitage, G. 2008. A survey of techniques for internet traffic classification using machine learning, to appear IEEE Communications Surveys and Tutorials 4 (2008).
[3]
Hampapur, A. and Bolle, R. M. 2001. Comparison of distance measures for video copy detection. In Proceedings of IEEE International Conference on Multimedia and Expo (Tokyo, Japan, Aug. 22--25, 2001). ICME '01. IEEE Computer Society, 737--740.
[4]
Dittmann, J., Hesse, D., and Hillert, R. 2005. Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set. In Proceedings of Security, Steganography, and Watermarking of Multimedia Contents VII, Electronic Imaging Science and Technology (San Jose, California, Jan. 16--20, 2005). SPIE, 607--618.

Cited By

View all
  • (2023)Threat-Based Simulation of Data Exfiltration Toward Mitigating Multiple Ransomware ExtortionsDigital Threats: Research and Practice10.1145/35689934:4(1-23)Online publication date: 20-Oct-2023
  • (2023)Insider Intrusion Detection Techniques: A State-of-the-Art ReviewJournal of Computer Information Systems10.1080/08874417.2023.217533764:1(106-123)Online publication date: 14-Feb-2023
  • (2022)Data Leakage Prevention System for Internal Security2022 International Conference on Futuristic Technologies (INCOFT)10.1109/INCOFT55651.2022.10094509(1-6)Online publication date: 25-Nov-2022
  • Show More Cited By

Index Terms

  1. Detecting sensitive data exfiltration by an insider attack

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    CSIIRW '08: Proceedings of the 4th annual workshop on Cyber security and information intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead
    May 2008
    470 pages
    ISBN:9781605580982
    DOI:10.1145/1413140
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 12 May 2008

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. data exfiltration
    2. insider attack
    3. signatures

    Qualifiers

    • Research-article

    Conference

    CSIIRW '08

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)3
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 13 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Threat-Based Simulation of Data Exfiltration Toward Mitigating Multiple Ransomware ExtortionsDigital Threats: Research and Practice10.1145/35689934:4(1-23)Online publication date: 20-Oct-2023
    • (2023)Insider Intrusion Detection Techniques: A State-of-the-Art ReviewJournal of Computer Information Systems10.1080/08874417.2023.217533764:1(106-123)Online publication date: 14-Feb-2023
    • (2022)Data Leakage Prevention System for Internal Security2022 International Conference on Futuristic Technologies (INCOFT)10.1109/INCOFT55651.2022.10094509(1-6)Online publication date: 25-Nov-2022
    • (2022)Towards Mitigation of Data Exfiltration Techniques Using the MITRE ATT&CK FrameworkDigital Forensics and Cyber Crime10.1007/978-3-031-06365-7_9(139-158)Online publication date: 4-Jun-2022
    • (2021)NetProtect: Network Perturbations to Protect Nodes against Entry-Point AttackProceedings of the 13th ACM Web Science Conference 202110.1145/3447535.3462500(93-101)Online publication date: 21-Jun-2021
    • (2021)Simulations of Event-Based Cyber Dynamics via Adversarial Machine LearningScience of Cyber Security10.1007/978-3-030-89137-4_13(187-201)Online publication date: 10-Oct-2021
    • (2020)Watch Out! Doxware on the Way...Risks and Security of Internet and Systems10.1007/978-3-030-41568-6_18(279-292)Online publication date: 28-Feb-2020
    • (2017)A Turkish language based data leakage prevention system2017 5th International Symposium on Digital Forensic and Security (ISDFS)10.1109/ISDFS.2017.7916514(1-6)Online publication date: Apr-2017
    • (2016)Classification of Insider Threat Detection TechniquesProceedings of the 11th Annual Cyber and Information Security Research Conference10.1145/2897795.2897799(1-4)Online publication date: 5-Apr-2016
    • (2015)A visual analytics approach to detecting server redirections and data exfiltration2015 IEEE International Conference on Intelligence and Security Informatics (ISI)10.1109/ISI.2015.7165932(13-18)Online publication date: May-2015
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media