ERIC Number: ED549968
Record Type: Non-Journal
Publication Date: 2012
Pages: 141
Abstractor: As Provided
ISBN: 978-1-2672-7818-0
ISSN: N/A
EISSN: N/A
Defeating Insider Attacks via Autonomic Self-Protective Networks
Sibai, Faisal M.
ProQuest LLC, Ph.D. Dissertation, George Mason University
There has been a constant growing security concern with insider attacks on network accessible computer systems. Users with power credentials can do almost anything they want with the systems they own with very little control or oversight. Most breaches occurring nowadays by power users are considered legitimate access and not necessarily intrusions. Developing a solution for such problems is challenging because power users need flexible requirements to administer or maintain their systems. The increased usage of virtual environments, virtual systems, teleworking, and remote usage has made network access the preferred method for system administration. This dissertation describes the design and implementation of a network Autonomic Violation Prevention System (AVPS) framework that is intended to defeat the insider threat in organizations. The AVPS sits between privileged users and applications. It monitors traffic that traverses the network and takes actions as needed. A proof of concept prototype for the system was developed in a virtualized environment. FTP and Telnet were part of the application testbed. Rules that pertain to privileged user administration were applied. Actions that were tested successfully included traffic monitoring, replacement, blocking, and dropping. This work also examined the scalability of the AVPS design. An experimental testbed was built to obtain performance measures of the AVPS overhead, throughput, and response time. FTP, Database and Web servers were used in the application testbed. A variety of tests were performed including automated simultaneous transactions and manual simultaneous transactions. An M/M/N//M analytic queuing model was used to assess how well the AVPS system would perform for a finite population where the number of applications, users and AVPS engines vary under different load levels. The results showed that the AVPS exhibits a very low overhead and is therefore scalable. The AVPS architecture design was further enhanced to automate how signatures are created. Autonomic self-protection capabilities were added into the framework by implementing high level rules that set the goal for how violations are detected and signatures are created. Supervised self-learning capabilities were added via the use of Support Vector Machines (SVM) in order to classify the raw data and make final decisions on what is considered a violation and what is considered normal insider behavior. [The dissertation citations contained here are published with the permission of ProQuest LLC. Further reproduction is prohibited without permission. Copies of dissertations may be obtained by Telephone (800) 1-800-521-0600. Web page: http://bibliotheek.ehb.be:2222/en-US/products/dissertations/individuals.shtml.]
Descriptors: Computer Security, Power Structure, Information Technology, Computer Networks, Models, Crime Prevention, Information Security, Vandalism, Access to Information
ProQuest LLC. 789 East Eisenhower Parkway, P.O. Box 1346, Ann Arbor, MI 48106. Tel: 800-521-0600; Web site: http://bibliotheek.ehb.be:2222/en-US/products/dissertations/individuals.shtml
Publication Type: Dissertations/Theses - Doctoral Dissertations
Education Level: N/A
Audience: N/A
Language: English
Sponsor: N/A
Authoring Institution: N/A
Grant or Contract Numbers: N/A