首页 > 最新文献

Insider Threats '10最新文献

英文 中文
Detecting data misuse by applying context-based data linkage 通过应用基于上下文的数据链接检测数据误用
Pub Date : 2010-10-08 DOI: 10.1145/1866886.1866890
Ma'ayan Gafny, A. Shabtai, L. Rokach, Y. Elovici
Detecting data leakage/misuse poses a great challenge for organizations. Whether caused by malicious intent or an inadvertent mistake, data leakage/misuse can diminish a company's brand, reduce shareholder value, and damage the company's goodwill and reputation. This challenge is intensified when trying to detect and/or prevent data leakage/misuse performed by an insider with legitimate permissions to access the organization's systems and its critical data. In this paper we propose a new approach for identifying suspicious insiders who can access data stored in a database via an application. In the proposed method suspicious access to sensitive data is detected by analyzing the result-sets sent to the user following a request that the user submitted. Result-sets are analyzed within the instantaneous context in which the request was submitted. From the analysis of the result-set and the context we derive a "level of anomality". If the derived level is above a predefined threshold, an alert can be sent to the security officer. The proposed method applies data-linkage techniques in order to link the contextual features and the result-sets. Machine learning algorithms are then employed for generating a behavioral model during a learning phase. The behavioral model encapsulates knowledge on the behavior of a user; i.e., the characteristics of the result-sets of legitimate or malicious requests. This behavioral model is used for identifying malicious requests based on their abnormality. An evaluation with sanitized data shows the usefulness of the proposed method in detecting data misuse.
检测数据泄漏/滥用对组织构成了巨大的挑战。无论是出于恶意还是无意,数据泄露/滥用都会损害公司的品牌,降低股东价值,损害公司的商誉和声誉。当试图检测和/或防止具有合法权限的内部人员访问组织的系统及其关键数据时,这一挑战就会加剧。在本文中,我们提出了一种新的方法来识别可以通过应用程序访问数据库中存储的数据的可疑内部人员。在提出的方法中,通过分析用户提交请求后发送给用户的结果集来检测对敏感数据的可疑访问。结果集在提交请求的即时上下文中进行分析。通过对结果集和上下文的分析,我们得出了一个“异常水平”。如果派生的级别高于预定义的阈值,则可以向安全人员发送警报。该方法采用数据链接技术,将上下文特征与结果集连接起来。然后使用机器学习算法在学习阶段生成行为模型。行为模型封装了用户行为的知识;例如,合法或恶意请求的结果集的特征。该行为模型用于根据异常情况识别恶意请求。对经过处理的数据进行了评估,结果表明了该方法在检测数据误用方面的有效性。
{"title":"Detecting data misuse by applying context-based data linkage","authors":"Ma'ayan Gafny, A. Shabtai, L. Rokach, Y. Elovici","doi":"10.1145/1866886.1866890","DOIUrl":"https://doi.org/10.1145/1866886.1866890","url":null,"abstract":"Detecting data leakage/misuse poses a great challenge for organizations. Whether caused by malicious intent or an inadvertent mistake, data leakage/misuse can diminish a company's brand, reduce shareholder value, and damage the company's goodwill and reputation. This challenge is intensified when trying to detect and/or prevent data leakage/misuse performed by an insider with legitimate permissions to access the organization's systems and its critical data. In this paper we propose a new approach for identifying suspicious insiders who can access data stored in a database via an application. In the proposed method suspicious access to sensitive data is detected by analyzing the result-sets sent to the user following a request that the user submitted. Result-sets are analyzed within the instantaneous context in which the request was submitted. From the analysis of the result-set and the context we derive a \"level of anomality\". If the derived level is above a predefined threshold, an alert can be sent to the security officer. The proposed method applies data-linkage techniques in order to link the contextual features and the result-sets. Machine learning algorithms are then employed for generating a behavioral model during a learning phase. The behavioral model encapsulates knowledge on the behavior of a user; i.e., the characteristics of the result-sets of legitimate or malicious requests. This behavioral model is used for identifying malicious requests based on their abnormality. An evaluation with sanitized data shows the usefulness of the proposed method in detecting data misuse.","PeriodicalId":249095,"journal":{"name":"Insider Threats '10","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132743457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Reverse engineering for mobile systems forensics with Ares 利用阿瑞斯进行移动系统取证的逆向工程
Pub Date : 2010-10-08 DOI: 10.1145/1866886.1866892
Jonathan S. Tuttle, R. Walls, E. Learned-Miller, B. Levine
We present Ares, a reverse engineering technique for assisting in the analysis of data recovered for the investigation of mobile and embedded systems. The focus of investigations into insider activity is most often on the data stored on the insider's computers and digital device - call logs, email messaging, calendar entries, text messages, and browser history - rather than on the status of the system's security. Ares is novel in that it uses a data-driven approach that incorporates natural language processing techniques to infer the layout of input data that has been created according to some unknown specification. While some other reverse engineering techniques based on instrumentation of executables offer high accuracy, they are hard to apply to proprietary phone architectures. We evaluated the effectiveness of Ares on call logs and contact lists from ten used Nokia cell phones. We created a rule set by manually reverse engineering a single Nokia phone. Without modification to that grammar, Ares parsed most phones' data with 90% of the accuracy of a commercial forensics tool based on manual reverse engineering, and all phones with at least 50% accuracy even though the endianess for one phone changed.
我们提出Ares,一种逆向工程技术,用于协助分析用于调查移动和嵌入式系统的恢复数据。调查内部活动的重点通常是存储在内部人员的计算机和数字设备上的数据——通话记录、电子邮件消息、日历条目、文本消息和浏览器历史记录——而不是系统的安全状态。Ares的新颖之处在于它使用了一种数据驱动的方法,该方法结合了自然语言处理技术来推断根据某些未知规范创建的输入数据的布局。虽然其他一些基于可执行文件插装的逆向工程技术提供了很高的准确性,但它们很难应用于专有的手机架构。我们评估了Ares对10部使用过的诺基亚手机的通话记录和联系人列表的有效性。我们通过手动对单个诺基亚手机进行逆向工程创建了一个规则集。在不修改语法的情况下,Ares解析大多数手机数据的准确率达到了基于人工逆向工程的商业取证工具的90%,即使一个手机的尾端顺序发生了变化,所有手机的准确率也至少达到了50%。
{"title":"Reverse engineering for mobile systems forensics with Ares","authors":"Jonathan S. Tuttle, R. Walls, E. Learned-Miller, B. Levine","doi":"10.1145/1866886.1866892","DOIUrl":"https://doi.org/10.1145/1866886.1866892","url":null,"abstract":"We present Ares, a reverse engineering technique for assisting in the analysis of data recovered for the investigation of mobile and embedded systems. The focus of investigations into insider activity is most often on the data stored on the insider's computers and digital device - call logs, email messaging, calendar entries, text messages, and browser history - rather than on the status of the system's security. Ares is novel in that it uses a data-driven approach that incorporates natural language processing techniques to infer the layout of input data that has been created according to some unknown specification. While some other reverse engineering techniques based on instrumentation of executables offer high accuracy, they are hard to apply to proprietary phone architectures. We evaluated the effectiveness of Ares on call logs and contact lists from ten used Nokia cell phones. We created a rule set by manually reverse engineering a single Nokia phone. Without modification to that grammar, Ares parsed most phones' data with 90% of the accuracy of a commercial forensics tool based on manual reverse engineering, and all phones with at least 50% accuracy even though the endianess for one phone changed.","PeriodicalId":249095,"journal":{"name":"Insider Threats '10","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123627131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Role-based differentiation for insider detection algorithms 基于角色的内部检测算法的区分
Pub Date : 2010-10-08 DOI: 10.1145/1866886.1866897
Suraj Nellikar, D. Nicol, Jai J. Choi
Insider threat problems are widespread in industry today, resulting in large losses of intellectual property. Reputable reports assert that attacks from within an organization are on the rise, making detection of insider-based attacks a top priority. This paper evaluates the effectiveness of using role-based differentiation of user behavior as a tool in detecting insider attack behavior. This differentiation is natural in contexts where role-based access control (RBAC) mechanisms are in place. Using synthetically generated traffic (which puts placement and intensity of insider behavior under experimental control), we train five different algorithms on "normal" behavior with and without RBAC differentiation, and measure the accuracy of detecting malicious behavior with, and without RBAC, as a function of insider behavior. We find that in some contexts RBAC differentiation significantly reduces these errors. However, in our experiments two of the five algorithms had statistically significant increases in false positives under RBAC as opposed to non-RBAC. However, these increases are small compared to the very large gain in detection capability that RBAC brings, and we conclude that RBAC is very much worth considering as a tool for insider threat detection.
如今,内部威胁问题在工业中普遍存在,导致大量知识产权损失。信誉良好的报告断言,来自组织内部的攻击正在上升,因此检测基于内部的攻击是当务之急。本文评估了使用基于角色的用户行为区分作为检测内部攻击行为的工具的有效性。在采用基于角色的访问控制(RBAC)机制的环境中,这种区别是很自然的。使用合成生成的流量(将内部行为的位置和强度置于实验控制之下),我们在有和没有RBAC区分的“正常”行为上训练了五种不同的算法,并测量了有和没有RBAC检测恶意行为的准确性,作为内部行为的函数。我们发现,在某些情况下,RBAC分化显著减少了这些错误。然而,在我们的实验中,与非RBAC相比,RBAC下五种算法中的两种在统计上显著增加了假阳性。然而,与RBAC带来的检测能力的巨大增长相比,这些增长很小,我们得出的结论是,RBAC非常值得考虑作为内部威胁检测的工具。
{"title":"Role-based differentiation for insider detection algorithms","authors":"Suraj Nellikar, D. Nicol, Jai J. Choi","doi":"10.1145/1866886.1866897","DOIUrl":"https://doi.org/10.1145/1866886.1866897","url":null,"abstract":"Insider threat problems are widespread in industry today, resulting in large losses of intellectual property. Reputable reports assert that attacks from within an organization are on the rise, making detection of insider-based attacks a top priority. This paper evaluates the effectiveness of using role-based differentiation of user behavior as a tool in detecting insider attack behavior. This differentiation is natural in contexts where role-based access control (RBAC) mechanisms are in place. Using synthetically generated traffic (which puts placement and intensity of insider behavior under experimental control), we train five different algorithms on \"normal\" behavior with and without RBAC differentiation, and measure the accuracy of detecting malicious behavior with, and without RBAC, as a function of insider behavior. We find that in some contexts RBAC differentiation significantly reduces these errors. However, in our experiments two of the five algorithms had statistically significant increases in false positives under RBAC as opposed to non-RBAC. However, these increases are small compared to the very large gain in detection capability that RBAC brings, and we conclude that RBAC is very much worth considering as a tool for insider threat detection.","PeriodicalId":249095,"journal":{"name":"Insider Threats '10","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130652641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Detecting insider activity using enhanced directory virtualization 使用增强的目录虚拟化检测内部活动
Pub Date : 2010-10-08 DOI: 10.1145/1866886.1866894
W. Claycomb, Dongwan Shin
Insider threats often target authentication and access control systems, which are frequently based on directory services. Detecting these threats is challenging, because malicious users with the technical ability to modify these structures often have sufficient knowledge and expertise to conceal unauthorized activity. The use of directory virtualization to monitor various systems across an enterprise can be a valuable tool for detecting insider activity. The addition of a policy engine to directory virtualization services enhances monitoring capabilities by allowing greater flexibility in analyzing changes for malicious intent. The resulting architecture is a system-based approach, where the relationships and dependencies between data sources and directory services are used to detect an insider threat, rather than simply relying on point solutions. This paper presents such an architecture in detail, including a description of implementation results.
内部威胁通常针对身份验证和访问控制系统,这些系统通常基于目录服务。检测这些威胁具有挑战性,因为具有修改这些结构的技术能力的恶意用户通常具有足够的知识和专业知识来隐藏未经授权的活动。使用目录虚拟化来监视企业中的各种系统,对于检测内部活动来说是一种很有价值的工具。将策略引擎添加到目录虚拟化服务中,可以更灵活地分析恶意意图的更改,从而增强监视功能。由此产生的体系结构是一种基于系统的方法,其中数据源和目录服务之间的关系和依赖关系用于检测内部威胁,而不是简单地依赖于点解决方案。本文详细介绍了这种体系结构,包括实现结果的描述。
{"title":"Detecting insider activity using enhanced directory virtualization","authors":"W. Claycomb, Dongwan Shin","doi":"10.1145/1866886.1866894","DOIUrl":"https://doi.org/10.1145/1866886.1866894","url":null,"abstract":"Insider threats often target authentication and access control systems, which are frequently based on directory services. Detecting these threats is challenging, because malicious users with the technical ability to modify these structures often have sufficient knowledge and expertise to conceal unauthorized activity. The use of directory virtualization to monitor various systems across an enterprise can be a valuable tool for detecting insider activity. The addition of a policy engine to directory virtualization services enhances monitoring capabilities by allowing greater flexibility in analyzing changes for malicious intent. The resulting architecture is a system-based approach, where the relationships and dependencies between data sources and directory services are used to detect an insider threat, rather than simply relying on point solutions. This paper presents such an architecture in detail, including a description of implementation results.","PeriodicalId":249095,"journal":{"name":"Insider Threats '10","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124790001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Duress detection for authentication attacks against multiple administrators 强制检测针对多个管理员的认证攻击
Pub Date : 2010-10-08 DOI: 10.1145/1866886.1866895
Emil Stefanov, M. Atallah
An authentication system is duress-resistant if it allows a user or system administrator to covertly send a silent alarm during the login process, indicating that they are being forced to authenticate against their will. The adversary knows that the system has this feature, e.g., if two passwords are used (one normal and one duress) then the adversary will demand from a victim both passwords. We require that the adversary is not able to distinguish a non-cooperating victim from a cooperating victim, even if there are multiple victims some of whom cooperate while others do not. To avoid a false alarm, we also require that the probability of a user accidentally sending a duress signal (e.g., through typos) is small. After arguing that existing techniques are inadequate for such requirements, we present our design and implementation of a duress-resistant authentication system that can be used by any number of administrators and users. Our system is compatible with existing authentication systems, and can be implemented as an augmentation of their capabilities that does not require modification of their internals.
如果身份验证系统允许用户或系统管理员在登录过程中秘密地发送无声警报,表明他们正在被迫进行违背其意愿的身份验证,则该系统是抗胁迫的。攻击者知道系统有这个特性,例如,如果使用了两个密码(一个是正常密码,一个是强制密码),那么攻击者就会向受害者索取两个密码。我们要求对手不能区分不合作的受害者和合作的受害者,即使有多个受害者,其中一些人合作而另一些人不合作。为了避免假警报,我们还要求用户意外发送胁迫信号(例如,通过打字错误)的概率很小。在论证了现有的技术不足以满足这样的需求之后,我们提出了一个可以被任意数量的管理员和用户使用的抗胁迫身份验证系统的设计和实现。我们的系统与现有的身份验证系统兼容,并且可以作为其功能的增强而实现,而不需要修改其内部结构。
{"title":"Duress detection for authentication attacks against multiple administrators","authors":"Emil Stefanov, M. Atallah","doi":"10.1145/1866886.1866895","DOIUrl":"https://doi.org/10.1145/1866886.1866895","url":null,"abstract":"An authentication system is duress-resistant if it allows a user or system administrator to covertly send a silent alarm during the login process, indicating that they are being forced to authenticate against their will. The adversary knows that the system has this feature, e.g., if two passwords are used (one normal and one duress) then the adversary will demand from a victim both passwords. We require that the adversary is not able to distinguish a non-cooperating victim from a cooperating victim, even if there are multiple victims some of whom cooperate while others do not. To avoid a false alarm, we also require that the probability of a user accidentally sending a duress signal (e.g., through typos) is small. After arguing that existing techniques are inadequate for such requirements, we present our design and implementation of a duress-resistant authentication system that can be used by any number of administrators and users. Our system is compatible with existing authentication systems, and can be implemented as an augmentation of their capabilities that does not require modification of their internals.","PeriodicalId":249095,"journal":{"name":"Insider Threats '10","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128841988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
M-score: estimating the potential damage of data leakage incident by assigning misuseability weight M-score:通过分配可用性权重来估计数据泄露事件的潜在危害
Pub Date : 2010-10-08 DOI: 10.1145/1866886.1866891
Amir Harel, A. Shabtai, L. Rokach, Y. Elovici
Over the past few years data leakage and data misuse have become a major concern for organizations. A data leakage or data misuse incident can damage an organization's reputation and brand name as well as compromise the privacy of its customers. Much research has been conducted in order to find a solution to these threats. Most methods are based on anomaly detection that tracks the user's behavior by examining the syntax of SQL queries in order to detect outlier queries. Other methods examine the data retrieved by the query. In this paper, we propose a new concept for analyzing the retrieved data - the Misuseability Weight. This approach focuses on assigning a score that represents the sensitivity level of the data exposed to the user. This measure predicts the ability of a user to exploit the exposed data in a malicious way. We suggest a new measure, the M-score, which assigns a misuseability weight to a table of data, propose some properties of the new measure and demonstrate its usefulness using over several leakage scenarios.
在过去的几年中,数据泄露和数据滥用已经成为组织关注的主要问题。数据泄露或数据滥用事件可能会损害组织的声誉和品牌,并危及其客户的隐私。为了找到解决这些威胁的办法,已经进行了大量的研究。大多数方法都基于异常检测,通过检查SQL查询的语法来跟踪用户的行为,以便检测异常查询。其他方法检查查询检索到的数据。本文提出了一个分析检索数据的新概念——可用性权重。这种方法侧重于分配一个分数,该分数表示暴露给用户的数据的敏感程度。该措施预测用户以恶意方式利用暴露数据的能力。我们提出了一个新的度量,M-score,它为数据表分配了一个可用性权重,提出了新度量的一些属性,并通过几个泄漏场景展示了它的有用性。
{"title":"M-score: estimating the potential damage of data leakage incident by assigning misuseability weight","authors":"Amir Harel, A. Shabtai, L. Rokach, Y. Elovici","doi":"10.1145/1866886.1866891","DOIUrl":"https://doi.org/10.1145/1866886.1866891","url":null,"abstract":"Over the past few years data leakage and data misuse have become a major concern for organizations. A data leakage or data misuse incident can damage an organization's reputation and brand name as well as compromise the privacy of its customers. Much research has been conducted in order to find a solution to these threats. Most methods are based on anomaly detection that tracks the user's behavior by examining the syntax of SQL queries in order to detect outlier queries. Other methods examine the data retrieved by the query. In this paper, we propose a new concept for analyzing the retrieved data - the Misuseability Weight. This approach focuses on assigning a score that represents the sensitivity level of the data exposed to the user. This measure predicts the ability of a user to exploit the exposed data in a malicious way. We suggest a new measure, the M-score, which assigns a misuseability weight to a table of data, propose some properties of the new measure and demonstrate its usefulness using over several leakage scenarios.","PeriodicalId":249095,"journal":{"name":"Insider Threats '10","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116792425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Using empirical insider threat case data to design a mitigation strategy 利用经验内部威胁案例数据设计缓解策略
Pub Date : 2010-10-08 DOI: 10.1145/1866886.1866888
Dawn M. Cappelli
1. Understanding the Complexity of Insider Threat According to research by the CERT Program (CERT) in the Software Engineering Institute at Carnegie Mellon University, approximately half of all organizat1ons experience at least one electronic crime perpetrated by an insider each year. These crimes include theft, sabotage, fraud, and espionage. CERT began researching this problem in 2001. It has compiled a database of more than 500 criminal cases in which current or former employees, contractors, or business partners abused the trust and access associated with their positions. As part of its research, CERT interviewed many victim organizations. It also interviewed some perpetrators themselves, complementing a wealth of case data with first-hand insights into the methods and motivations behind these crimes.
1. 了解内部威胁的复杂性根据卡内基梅隆大学软件工程研究所的CERT项目(CERT)的研究,大约一半的组织每年至少经历一次由内部人员实施的电子犯罪。这些罪行包括盗窃、破坏、欺诈和间谍活动。CERT于2001年开始研究这个问题。它编制了一个数据库,其中包含500多起刑事案件,这些案件涉及现任或前任雇员、承包商或商业伙伴滥用与职位相关的信任和权限。作为研究的一部分,CERT采访了许多受害组织。它还采访了一些犯罪者本人,通过对这些犯罪背后的方法和动机的第一手见解来补充丰富的案件数据。
{"title":"Using empirical insider threat case data to design a mitigation strategy","authors":"Dawn M. Cappelli","doi":"10.1145/1866886.1866888","DOIUrl":"https://doi.org/10.1145/1866886.1866888","url":null,"abstract":"1. Understanding the Complexity of Insider Threat According to research by the CERT Program (CERT) in the Software Engineering Institute at Carnegie Mellon University, approximately half of all organizat1ons experience at least one electronic crime perpetrated by an insider each year. These crimes include theft, sabotage, fraud, and espionage. CERT began researching this problem in 2001. It has compiled a database of more than 500 criminal cases in which current or former employees, contractors, or business partners abused the trust and access associated with their positions. As part of its research, CERT interviewed many victim organizations. It also interviewed some perpetrators themselves, complementing a wealth of case data with first-hand insights into the methods and motivations behind these crimes.","PeriodicalId":249095,"journal":{"name":"Insider Threats '10","volume":"206 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120886344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ReDS: reputation for directory services in P2P systems red: P2P系统中目录服务的声誉
Pub Date : 1900-01-01 DOI: 10.1145/1866886.1866896
R. Akavipat, Apurv Dhadphale, Apu Kapadia, M. Wright
P2P systems rely on directory services for locating peers with the desired content and services. Directory services are themselves decentralized, such as with distributed hash tables (DHTs) that allow for efficient locating of objects without a centralized directory. As a system distributed over a diverse set of untrusted nodes, however, directory services must be resilient to adversarial behavior by such malicious insiders. While redundancy-based DHTs such as Salsa and Halo mitigate the effects of adversarial behavior, they incur substantial overhead due to redundant lookups. We propose Reputation for Directory Services (ReDS), a framework for using reputation management to enhance the security and reduce the costs of redundancy-based DHTs in the face of insider attacks. We present ReDS designs for both Salsa and Halo, and we show that peers can significantly boost the success rates of directory lookups by considering past performance. For example, our simulations show that Salsa-ReDS can reduce lookup failure rates by up to 94%. We find that applying ReDS effectively cuts the redundancy required by both Salsa and Halo in half to get comparable results.
P2P系统依靠目录服务来定位具有所需内容和服务的对等点。目录服务本身是分散的,例如使用分布式哈希表(dht),它允许在没有集中目录的情况下有效地定位对象。然而,作为分布在各种不受信任节点上的系统,目录服务必须能够抵御来自此类恶意内部人员的敌对行为。虽然基于冗余的dht(如Salsa和Halo)减轻了对抗性行为的影响,但由于冗余查找,它们会产生大量开销。我们提出了目录服务信誉(red),这是一个框架,用于使用信誉管理来增强安全性并降低面对内部攻击时基于冗余的dht的成本。我们展示了Salsa和Halo的red设计,并且通过考虑过去的性能,我们展示了对等节点可以显著提高目录查找的成功率。例如,我们的模拟表明salsa - red可以将查找失败率降低高达94%。我们发现,应用red可以有效地将Salsa和Halo所需的冗余减少一半,从而获得可比较的结果。
{"title":"ReDS: reputation for directory services in P2P systems","authors":"R. Akavipat, Apurv Dhadphale, Apu Kapadia, M. Wright","doi":"10.1145/1866886.1866896","DOIUrl":"https://doi.org/10.1145/1866886.1866896","url":null,"abstract":"P2P systems rely on directory services for locating peers with the desired content and services. Directory services are themselves decentralized, such as with distributed hash tables (DHTs) that allow for efficient locating of objects without a centralized directory. As a system distributed over a diverse set of untrusted nodes, however, directory services must be resilient to adversarial behavior by such malicious insiders. While redundancy-based DHTs such as Salsa and Halo mitigate the effects of adversarial behavior, they incur substantial overhead due to redundant lookups. We propose Reputation for Directory Services (ReDS), a framework for using reputation management to enhance the security and reduce the costs of redundancy-based DHTs in the face of insider attacks. We present ReDS designs for both Salsa and Halo, and we show that peers can significantly boost the success rates of directory lookups by considering past performance. For example, our simulations show that Salsa-ReDS can reduce lookup failure rates by up to 94%. We find that applying ReDS effectively cuts the redundancy required by both Salsa and Halo in half to get comparable results.","PeriodicalId":249095,"journal":{"name":"Insider Threats '10","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123406879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Insider Threats '10
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1