Cargando…

Obfuscation of Malicious Behaviors for Thwarting Masquerade Detection Systems Based on Locality Features

In recent years, dynamic user verification has become one of the basic pillars for insider threat detection. From these threats, the research presented in this paper focuses on masquerader attacks, a category of insiders characterized by being intentionally conducted by persons outside the organizat...

Descripción completa

Detalles Bibliográficos
Autores principales: Maestre Vidal, Jorge, Sotelo Monge, Marco Antonio
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7181010/
https://www.ncbi.nlm.nih.gov/pubmed/32272806
http://dx.doi.org/10.3390/s20072084
_version_ 1783525953758035968
author Maestre Vidal, Jorge
Sotelo Monge, Marco Antonio
author_facet Maestre Vidal, Jorge
Sotelo Monge, Marco Antonio
author_sort Maestre Vidal, Jorge
collection PubMed
description In recent years, dynamic user verification has become one of the basic pillars for insider threat detection. From these threats, the research presented in this paper focuses on masquerader attacks, a category of insiders characterized by being intentionally conducted by persons outside the organization that somehow were able to impersonate legitimate users. Consequently, it is assumed that masqueraders are unaware of the protected environment within the targeted organization, so it is expected that they move in a more erratic manner than legitimate users along the compromised systems. This feature makes them susceptible to being discovered by dynamic user verification methods based on user profiling and anomaly-based intrusion detection. However, these approaches are susceptible to evasion through the imitation of the normal legitimate usage of the protected system (mimicry), which is being widely exploited by intruders. In order to contribute to their understanding, as well as anticipating their evolution, the conducted research focuses on the study of mimicry from the standpoint of an uncharted terrain: the masquerade detection based on analyzing locality traits. With this purpose, the problem is widely stated, and a pair of novel obfuscation methods are introduced: locality-based mimicry by action pruning and locality-based mimicry by noise generation. Their modus operandi, effectiveness, and impact are evaluated by a collection of well-known classifiers typically implemented for masquerade detection. The simplicity and effectiveness demonstrated suggest that they entail attack vectors that should be taken into consideration for the proper hardening of real organizations.
format Online
Article
Text
id pubmed-7181010
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-71810102020-04-30 Obfuscation of Malicious Behaviors for Thwarting Masquerade Detection Systems Based on Locality Features Maestre Vidal, Jorge Sotelo Monge, Marco Antonio Sensors (Basel) Article In recent years, dynamic user verification has become one of the basic pillars for insider threat detection. From these threats, the research presented in this paper focuses on masquerader attacks, a category of insiders characterized by being intentionally conducted by persons outside the organization that somehow were able to impersonate legitimate users. Consequently, it is assumed that masqueraders are unaware of the protected environment within the targeted organization, so it is expected that they move in a more erratic manner than legitimate users along the compromised systems. This feature makes them susceptible to being discovered by dynamic user verification methods based on user profiling and anomaly-based intrusion detection. However, these approaches are susceptible to evasion through the imitation of the normal legitimate usage of the protected system (mimicry), which is being widely exploited by intruders. In order to contribute to their understanding, as well as anticipating their evolution, the conducted research focuses on the study of mimicry from the standpoint of an uncharted terrain: the masquerade detection based on analyzing locality traits. With this purpose, the problem is widely stated, and a pair of novel obfuscation methods are introduced: locality-based mimicry by action pruning and locality-based mimicry by noise generation. Their modus operandi, effectiveness, and impact are evaluated by a collection of well-known classifiers typically implemented for masquerade detection. The simplicity and effectiveness demonstrated suggest that they entail attack vectors that should be taken into consideration for the proper hardening of real organizations. MDPI 2020-04-07 /pmc/articles/PMC7181010/ /pubmed/32272806 http://dx.doi.org/10.3390/s20072084 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Maestre Vidal, Jorge
Sotelo Monge, Marco Antonio
Obfuscation of Malicious Behaviors for Thwarting Masquerade Detection Systems Based on Locality Features
title Obfuscation of Malicious Behaviors for Thwarting Masquerade Detection Systems Based on Locality Features
title_full Obfuscation of Malicious Behaviors for Thwarting Masquerade Detection Systems Based on Locality Features
title_fullStr Obfuscation of Malicious Behaviors for Thwarting Masquerade Detection Systems Based on Locality Features
title_full_unstemmed Obfuscation of Malicious Behaviors for Thwarting Masquerade Detection Systems Based on Locality Features
title_short Obfuscation of Malicious Behaviors for Thwarting Masquerade Detection Systems Based on Locality Features
title_sort obfuscation of malicious behaviors for thwarting masquerade detection systems based on locality features
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7181010/
https://www.ncbi.nlm.nih.gov/pubmed/32272806
http://dx.doi.org/10.3390/s20072084
work_keys_str_mv AT maestrevidaljorge obfuscationofmaliciousbehaviorsforthwartingmasqueradedetectionsystemsbasedonlocalityfeatures
AT sotelomongemarcoantonio obfuscationofmaliciousbehaviorsforthwartingmasqueradedetectionsystemsbasedonlocalityfeatures