Difference between revisions of "Detecting Threatening Insiders with Lightweight Media Forensics"

From Simson Garfinkel
Jump to navigationJump to search
(Created page with "This research uses machine learning and outlier analysis to detect potentially hostile insiders through the auto mated analysis of stored data on cell phones, laptops, and des...")
 
Line 9: Line 9:


==Project Status==
==Project Status==
Our project, now in its seonc year, is a three-year project funded by the Department of Homeland Security, Science and Technology Directorate, Cyber Security Division.
Our project, now in its second year, is a three-year project funded by the Department of Homeland Security, Science and Technology Directorate, Cyber Security Division.
 
==Publications==
==Publications==



Revision as of 08:51, 6 April 2014

This research uses machine learning and outlier analysis to detect potentially hostile insiders through the auto mated analysis of stored data on cell phones, laptops, and desktop computers belonging to members of an organization. Whereas other systems look for specific signatures associated with hostile insider activity, our system is based on the creation of a “storage profile” for each user and then an automated analysis of all the storage profiles in the organization, with the purpose of finding storage outliers.

Our hypothesis is that malicious insiders will have specific data and concentrations of data that differ from their colleagues and coworkers. By exploiting these differences, we can identify potentially hostile insiders.

Our system is based on a combination of existing open source computer forensic tools and datamining algorithms. We modify these tools to perform a “lightweight” analysis based on statistical sampling over time. In this, our approach is both efficient and privacy sensitive. As a result, we can detect not just individuals that differ from their co-workers, but also insiders that differ from their historic norms. Accordingly, we should be able to detect insiders that have been “turned” by events or outside organizations. We should also be able to detect insider accounts that have been taken over by outsiders.

Project Status

Our project, now in its second year, is a three-year project funded by the Department of Homeland Security, Science and Technology Directorate, Cyber Security Division.

Publications

Technology

Disclaimer

This material is based on research sponsored by the Department of Homeland Security (DHS) Science and Technology Directorate, Homeland Security Advanced Research Projects Agency, Cyber Security Division (DHS S&T/HSARPA/CSD) via BAA 11-02, and the Department of National Defence of Canada, Defence Research and Development Canada (DRDC).

The views expressed in this work are those of the authors and do not necessarily reflect the official policy or position of the Naval Postgraduate School; the Department of the Navy; the Department of Defense; the Department of Homeland Security; the U.S. Government; or the Department of National Defence of Canada, Defence Research and Development Canada (DRDC).