A Fine-Grained Approach for Anomaly Detection in File System Accesses With Enhanced Temporal User Profiles

被引:1
|
作者
Mehnaz, Shagufta [1 ]
Bertino, Elisa [1 ,2 ]
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
[2] Purdue Univ, Cyber Ctr, W Lafayette, IN 47907 USA
关键词
Organizations; Anomaly detection; Access control; Data protection; Task analysis; Feature extraction; Insider attacks; anomaly detection; file system access; INSIDER ATTACK DETECTION; INTRUSION-DETECTION;
D O I
10.1109/TDSC.2019.2954507
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Protecting sensitive data from theft, exfiltration, and other kinds of abuses by malicious insiders is a challenging problem. While access control mechanisms cannot always prevent the insiders from misusing sensitive data (since, in most of the cases, authorized users within organizations are granted access permissions), malicious outsiders also pose severe threats due to different security vulnerabilities in the systems, e.g., phishing attacks, memory corruptions, etc., which enable them to steal the credentials of the authorized users who have access to the data. To protect sensitive data from such attackers, anomaly detection techniques are often combined with other existing security measures, e.g., access control and encryption. An anomaly detection technique for identifying anomalies in file system accesses is based on the key idea that there should be significant differences between the file access behaviors of a benign user and an attacker. In this article, we propose an approach to create fine-grained profiles of the users' regular file access activities while extensively analyzing the timestamp information of the file accesses. According to our observation, even if a user's access to a file seems benign, only a fine-grained analysis of the access (such as the size of access, the timestamp of access) can determine the original intention of the user. We exploit the users' file access information at the block level to model their regular file access behaviors (user profiles) which are then securely stored and used for identifying anomalous file system accesses in the detection phase. We are also able to automatically profile new files and new users added to the system dynamically. Finally, our performance evaluations demonstrate that our proposed approach has an accuracy of 98.7 percent in detecting anomalies while incurring an overhead of only 2 percent.
引用
收藏
页码:2535 / 2550
页数:16
相关论文
共 50 条
  • [1] Ghostbuster: A Fine-grained Approach for Anomaly Detection in File System Accesses
    Mehnaz, Shagufta
    Bertino, Elisa
    [J]. PROCEEDINGS OF THE SEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'17), 2017, : 3 - 14
  • [2] Building Robust Temporal User Profiles for Anomaly Detection in File System Accesses
    Mehnaz, Shagufta
    Bertino, Elisa
    [J]. 2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
  • [3] TaskInsight: A Fine-grained Performace Anomaly Detection and Problem Locating System
    Zhang, Xiao
    Meng, Fanjing
    Chen, Pengfei
    Xu, Jingmin
    [J]. PROCEEDINGS OF 2016 IEEE 9TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2016, : 917 - 920
  • [4] PerfDB: A Data Management System for Fine-Grained Performance Anomaly Detection
    Kimball, Joshua
    Lima, Rodrigo Alves
    Kanemasa, Yasuhiko
    Pu, Calton
    [J]. 2020 IEEE 6TH INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC 2020), 2020, : 97 - 106
  • [5] Anomaly detection in computer security and an application to file system accesses
    Stolfo, SJ
    Hershkop, S
    Bui, LH
    Ferster, R
    Wang, K
    [J]. FOUNDATIONS OF INTELLIGENT SYSTEMS, PROCEEDINGS, 2005, 3488 : 14 - 28
  • [6] A Lightweight and Fine-grained File System Sandboxing Framework
    Bijlani, Ashish
    Ramachandran, Umakishore
    [J]. 9TH ASIA-PACIFIC SYSTEMS WORKSHOP 2018 (APSYS'18), 2018,
  • [7] Fine-Grained Multivariate Time Series Anomaly Detection in IoT
    He, Shiming
    Guo, Meng
    Yang, Bo
    Alfarraj, Osama
    Tolba, Amr
    Sharma, Pradip Kumar
    Yan, Xi'ai
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 75 (03): : 5027 - 5047
  • [8] On the Feasibility of Anomaly Detection with Fine-Grained Program Tracing Events
    Hong-Wei Li
    Yu-Sung Wu
    Yennun Huang
    [J]. Journal of Network and Systems Management, 2022, 30
  • [9] On the Feasibility of Anomaly Detection with Fine-Grained Program Tracing Events
    Li, Hong-Wei
    Wu, Yu-Sung
    Huang, Yennun
    [J]. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2022, 30 (02)
  • [10] Anomaly Detection in Natural Scene Images Based on Enhanced Fine-Grained Saliency and Fuzzy Logic
    Mokayed, Hamam
    Shivakumara, Palaiahnakote
    Saini, Rajkumar
    Liwicki, Marcus
    Hin, Loo Chee
    Pal, Umapada
    [J]. IEEE ACCESS, 2021, 9 : 129102 - 129109