A Discretionary Access Control Method for Preventing Data Exfiltration (DE) via Removable Devices
نویسندگان
چکیده
One of the major challenges facing the security community today is how to prevent DE. DE is the unauthorized release of information from a computer system or network of systems. Current methods attempt to address this issue by controlling the information that is released over the Internet. In this paper, we present a host-level discretionary access control method that focuses on exfiltration via removable devices (e.g. thumb drives or external hard drives). Using XML to store extended file attributes, we classify files based on user-defined distribution levels and the community of interest to which they belong. Files are classified with a distribution statement upon creation and re-classified (if necessary) when modified. By monitoring the access to all classified files present on a file system, we allow or prevent release of this information based on predefined policies. With this approach, we show that the unauthorized release of information can be prevented by using a system of accounting that is tied to access control policies. Users are given the authority to transfer files to a removable device according to their current access rights. As a proof of concept, our method demonstrates the value of using accounting as a means of preventing data loss or theft. Our approach can be applied to a variety of data types found on a file system including: executables, archived files, images, and even audio or video files.
منابع مشابه
SEFS: Security Module for Extensible File System Architectures
Data security is a fundamental issue in modern computer systems. In particular, data storage systems are frequently subject to attacks and so need protection. Typical storage systems rely on access control mechanisms, either physical or logical, to prevent unauthorized users from accessing stored data. However, such mechanisms are useless against non-ethical attitudes taken by privileged users,...
متن کاملBridging the Air Gap: Inaudible Data Exfiltration by Insiders
As critical systems are increasingly dependent on software and are connected to the Internet, insider threats will be of ongoing concern. For example, corrupt insiders could deliberately introduce malicious software into the organisation’s system to surreptitiously gain control, and launch online attacks via and against compromised systems. In this paper, we present a method that an insider can...
متن کاملImplementation of Concurrent Access to File Systems in USB Devices
The combination of a removable storage device with a communication channel and a computation node is a common architectural theme in many system-on-chip (SOC) designs. The systems in which many of these devices are placed produce or consume digital media content from their removable storage devices, which are formatted with industrystandard file systems. When the communication channel is USB, t...
متن کاملA Mutual Authentication Method for Internet of Things
Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...
متن کاملA Method for Protecting Access Pattern in Outsourced Data
Protecting the information access pattern, which means preventing the disclosure of data and structural details of databases, is very important in working with data, especially in the cases of outsourced databases and databases with Internet access. The protection of the information access pattern indicates that mere data confidentiality is not sufficient and the privacy of queries and accesses...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009