Detecting Data Exfiltration by Integrating Information Across Layers

dc.contributor.authorSharma, Puneet
dc.contributor.authorJoshi, Anupam
dc.contributor.authorFinin, Tim
dc.date.accessioned2018-11-02T16:27:34Z
dc.date.available2018-11-02T16:27:34Z
dc.date.issued2013-08-14
dc.description14th IEEE International Conference on Information Reuse and Integrationen_US
dc.description.abstractData exfiltration is the unauthorized leakage of confidential data from a system. Unlike intrusions that seek to overtly disable or damage a system, it is particularly hard to detect because it uses a variety of low/slow vectors and advanced persistent threats (APTs). It is often assisted (intentionally or not) by an insider who might be an employee who downloads a trojan or uses a hardware component that has been tampered with or acquired from an unreliable source. Conventional scan and test based detection approaches work poorly, especially for hardware with embedded trojans. We describe a framework to detect potential exfiltration events that actively monitors of a set of key parameters that cover the entire stack, from hardware to the application layer. An attack alert is generated only if several monitors detect suspicious activity within a short temporal window. The cross-layer monitoring and integration helps ensure accurate alerts with fewer false positives and makes designing a successful attack more difficult.en_US
dc.description.sponsorshipThis research was partially supported by AFOSR award FA9550-08-1-0265 and a gift from Northrop Grumman. Joshi's work was supported by funds from the Oros Professorship endowment.en_US
dc.description.urihttps://ebiquity.umbc.edu/paper/html/id/625/Detecting-Data-Exfiltration-by-Integrating-Information-Across-Layersen_US
dc.format.extent8 pagesen_US
dc.genreconference papers and proceedings pre-printen_US
dc.identifierdoi:10.13016/M2639K89X
dc.identifier.citationPuneet Sharma, Anupam Joshi and Tim Finin, Detecting Data Exfiltration by Integrating Information Across Layers, IEEE 14th Int. Conf. on Information Reuse and Integration, San Francisco, Aug. 2013, https://ebiquity.umbc.edu/paper/html/id/625/Detecting-Data-Exfiltration-by-Integrating-Information-Across-Layersen_US
dc.identifier.urihttp://hdl.handle.net/11603/11849
dc.identifier.uri10.1109/IRI.2013.6642487
dc.language.isoen_USen_US
dc.publisherIEEEen_US
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Computer Science and Electrical Engineering Department Collection
dc.relation.ispartofUMBC Faculty Collection
dc.rightsThis item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.
dc.rights© 2013 IEEE
dc.subjectCybersecurityen_US
dc.subjectexfiltrationen_US
dc.subjectintrusionen_US
dc.subjectmalwareen_US
dc.subjectsecurityen_US
dc.subjectintrusion detection system (IDS)en_US
dc.titleDetecting Data Exfiltration by Integrating Information Across Layersen_US
dc.typeTexten_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
679.pd.pdf
Size:
922.3 KB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.68 KB
Format:
Item-specific license agreed upon to submission
Description: