Trusted Detection of Unauthorized Filesystem Modifications to Combat Insider Tampering †
نویسندگان
چکیده
An insider-robust approach to file integrity verification is developed using interacting strata of mobile agents. Previous approaches relied upon monolithic architectures, or more recently, agent frameworks using a centralized control mechanism or common reporting repository. However, any such distinct tamperingpoint introduces vulnerabilities, especially from knowledgeable insiders capable of abusing security-critical resources. In the Collaborative Object Notification Framework for Insider Defense using Autonomous Network Transactions (CONFIDANT), the mechanisms for tampering detection, decision-making, and alert signaling are corroborated by autonomous agents. All capabilities are distributed and transactions are interlocked by tamper-evident handshaking protocols. Moreover, the agent dispatch policies and travel itineraries are constructed dynamically in response to events throughout the network. This paper defines user capability classes and identifies critical physical tampering points in intrusion detection architectures. CONFIDANT is evaluated in the presence of the identified insider tampering exposures. Evaluation results are compared to the Tripwire and AIDE response to the same stimulus. Results show increased mitigation against tampering modes including Pacing, Altering Internal Data, and File Juggling. The mitigation techniques such as Encapsulation, Redundancy, Scrambling, and Mandatory Obsolescence, are capable of mitigating several challenging exposures including various insider tampering risks.
منابع مشابه
Mitigation of Insider Risks using Distributed Agent Detection, Filtering, and Signaling
An insider-robust approach to file integrity verification is developed using interacting strata of mobile agents. Previous approaches relied upon monolithic architectures, or more recently, agent frameworks using a centralized control mechanism or common reporting repository. However, any such distinct tampering-point introduces vulnerabilities, especially from knowledgeable insiders capable of...
متن کاملEvaluation of Distributed File Integrity Analyzers in the Presence of Tampering
In this paper, the Collaborative Object Notification Framework for Insider Defense using Autonomous Network Transactions (CONFIDANT) is evaluated in the presence of tampering. CONFIDANT’s mitigation capabilities are assessed and compared with conventional file integrity analyzers such as AIDE and tripwire. The potential of distributed techniques to address certain tampering modes such as Pacing...
متن کاملFormant enhancement based speech watermarking for tampering detection
Unauthorized tampering in speech signals has brought serious problems when verifying the originality and integrity of speech signals. Digital watermarking can effectively check if the original signals have been tampered by embedding digital data into them. This paper proposes a tampering detection scheme for speech signals based on formant enhancement-based watermarking. Watermarks are embedded...
متن کاملInsider threats: Detecting and controlling malicious insiders
Malicious insiders are posing unique security challenges to organizations due to their knowledge, capabilities, and authorized access to information systems. Data theft and IT sabotage are two of the most recurring themes among crimes committed by malicious insiders. This paper aims to investigate the scale and scope of malicious insider risks and explore the impact of such threats on business ...
متن کاملA Survey On Video Forgery Detection
The Digital Forgeries though not visibly identifiable to human perception it may alter or meddle with underlying natural statistics of digital content. Tampering involves fiddling with video content in order to cause damage or make unauthorized alteration/modification. Tampering detection in video is cumbersome compared to image when considering the properties of the video. Tampering impacts ne...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006