Download presentation
Presentation is loading. Please wait.
Published byMabel Beasley Modified over 9 years ago
1
Insider Access Behavior Team May 06 Brandon Reher Jake Gionet Steven Bromley Jon McKee Advisor Client Dr. Tom DanielsThe Boeing Company Contact Dr. Nick Multari
2
Original Description The goal of this project is to help students understand state-of-the-art techniques identifying malicious insider behavior. Our Scope Detect and identify users that are potentially leaking data to unknown outside sources. Research existing solutions and explain the advantages & disadvantages as they apply to the system Problem Statement
3
Implemented solution Log Parsing Systems generate logs for just about everything MySQL has the ability to log queries and / or "slow" queries Focus on MySQL logs o Connections o Database usage o Queries Proposed solutions System Tainting o Files & processes carry a contagious and traceable taint System Cloning o Duplicate systems for comparison of system calls Border watching File watermarks User baiting Possible Solutions
4
The Markov implementation uses time slices from the profile to create Markov chains For each new event processed a Markov chain is constructed, and the value is compared to the chain If the probability of a series of events is breaks an improbable threshold an alert is raised. Markov Implementation
5
Conceptual Sketch
6
Shall make use of pre-existing technologies Shall take input from a variety of sources and systems Shall correlate and filter relevant data Shall alert when malicious activity is discovered Shall have a system to provide notifications on alerts Shall contain an algorithm that decides whether an attack is being committed Functional Requirements
7
Shall have a low false-positive rate Shall be inconspicuous to the malicious user Shall provide alerts in a timely manner Shall abide by all licenses of open source software utilized Non-functional Requirements
8
The software shall be scalable to a large network The software shall alert within a reasonable amount of time Technical Constraints & Considerations
9
Operating Systems Red Hat Enterprise Linux - Version 6.0 NetBSD - Version 2.6.0 Software Platform Supporting Software MySQL Apache Web Server PHP Syslogd Application Software Java Runtime Environment Version 6 Update 24 The Java Runtime Environment allows our application to live on any platform that supports Java.
10
Application Servers These servers house the various applications that are to be monitored for unusual behavior. Log Storage Server The log storage server is used as a central repository to hold all the logs from the servers that are being monitored. Network configurations allow the server to remain inconspicuous to users accessing the application servers. Profiling Algorithm Server This server retrieves logs from the log storage server to be parsed by the profiling algorithm. Hardware Platform
12
Functional Decomposition
13
Profile Stores the learned information of user activity. Provides the expected actions over two time slices to the Decision Algorithm. Log Parser Parses incoming logs as they arrive Creates an event based off of the content of the log Decision Algorithm Determines if unusual activity is occuring. Makes decisions based on the current event and the time slices from the profile. Functional Modules
14
Initially, log files must be sent to a central location that is passed to the algorithm at the start. This is left to the administrator to configure The algorithm is packaged and executed as part of a jar file The algorithm is run in the background System Usage
15
The system interfaces with the user by: Allowing the administrator to launch the program via the command line. Alerting the administrator upon detection of a malicious activity. User Interface
16
Needed to incorporate profile generation as well as testing the alert algorithm Accomplished by simulating user traffic on an online forum Generates logged information in the MySQL database The forum software follows pattern, which makes predictable profile Breaking from the set profile indicates tampering in the system System should raise an alert Testing
17
Time Estimate Fall 2010 - Planning, Research Spring 2011 - Development, Implementation
18
ItemTeam HoursWithout LaborWith Labor Research1800$3,600 Dell PowerEdge T410 (x8) 10$6,392$6,592 Red Hat OS10$350$550 NetBSD OS70$140 Apache Install30$60 MySQL Install70$140 PHP Install30$60 Algorithm Development 300N/A$6,000 Totals520$6,742$17,142 Cost Analysis
19
Questions?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.