Home Tree Overview of Taxonomy

Main Taxonomy

Impact of Cybercrime and Cybersecurity
Super categories -> Main Taxonomy
Cyber attacks endanger governments and businesses, as well as, individuals. Cybersecurity is situated in an economic and social context and also causes significant changes in this context.
External Resources:
History
Super categories -> Impact of Cybercrime and Cybersecurity -> Main Taxonomy
The first people who abused electrical systems were so-called Phone Phreaks, which created devices that made sounds that would allow them to make free calls. Since then various phases of cybersecurity have happened. During the 90's, the world wide web started to flourish and self-replicating viruses made headlines. Later, Botnets were used for Denial of Service attacks. Lately, script injection and a variety of other techniques has been used to intrude into reputable websites and place malicious content there. Together with the change of domain, the cybercrimes have been increasingly professionalized.
External Resources:
Social Activism
Super categories -> Impact of Cybercrime and Cybersecurity -> Main Taxonomy
A number of groups have used hacking as a form of political activism. Groups like Anonymous and the Syrian Electric Army. This is sometimes called Hacktivism.
External Resources:
Policy and Law
Super categories -> Impact of Cybercrime and Cybersecurity -> Main Taxonomy
As a reaction to increased threats in the cyberspace, politicians have developed laws and policies for improving cybersecurity and making offenders legally liable.
External Resources:
Cybersecurity Laws
Super categories -> Policy and Law -> Impact of Cybercrime and Cybersecurity -> Main Taxonomy
Many nations and the United States in particular have developed cybersecurity laws. These laws assert that cyber criminals can be held accountable for their malicious actions. Still many legal questions remain unanswered.
External Resources:
  • Federal Laws Relating to Cybersecurity: Overview and Discussion of Proposed Revisions
    Eric A. Fisher; Congressional Research Service; 2013.
  • TitleFederal Laws Relating to Cybersecurity: Overview and Discussion of Proposed Revisions
    AuthorEric A. Fischer Senior Specialist in Science and Technology
    Year
    Keyword
    Abstract
  • Ten National Cyber Security Strategies: A Comparison
    H. A. M. Luiijf, Kim Besseling, Maartje Spoelstra, Patrick de Graaf; Proceedings CRITIS; pages 1-17; 2011.
  • TitleTen National Cyber Security Strategies: A Comparison
    AuthorH.A.M. Luiijf, Kim Besseling, Maartje Spoelstra, and Patrick de Graaf
    Year2009
    Keywordcyber security, strategy, policy, critical infrastructure, national security.
    AbstractA number of nations developed and published a national cyber security strategy (NCSS). Most of them were published in the period 2009 2011. Despite the fact that each of these NCSS intends to address the cyber security threat, large differences exist between the NCSS approaches. This paper analyses and compares the NCSS of Australia, Canada, Czech Republic, France, Germany, Japan, The Netherlands, New Zealand, the United Kingdom, and the United States. Thirteen observations lead to a set of conclusions which nations with an NCSS and developers of future NCSS may use to their advantage.
  • An Assessement of U.S. Legislation on Cybersecurity
    Acklyn Murray, Sherali Zeadally, Angelyn Flowers; Proceedings CyberSec; pages 289-294; 2012.
  • TitleAn Assessment of U.S. Legislation on Cybersecurity
    AuthorAcklyn Murray, Sherali Zeadally
    Year1996
    Keywordcyberattack; cybercrime; cybersecurity; legislation
    AbstractCybercrime continues to be on the rise and cybercriminals are launching increasingly sophisticated cyberattacks aimed at disrupting businesses through denial of service attacks and stealing personal information all with serious economic consequences. Law and policy makers are under increasing pressure to develop timely legislations to address cybercrime issues and provide effective measures to prosecute cybercriminals. We present a comprehensive review of the various laws that are currently available in the Unites States to control cybercrime and support cybersecurity. We also discuss proposed bills in light of how they address cybersecurity challenges in current legislations. Finally, we briefly present recent regulations and proposed bills related to cybersecurity in a few other countries which have set up various government initiatives in this area.
White House Policy Directive and Executive Order
Super categories -> Policy and Law -> Impact of Cybercrime and Cybersecurity -> Main Taxonomy
The Presidential policy directive and executive order detail the plan for securing the cyberspace of the United States. In particular, it concerns the critical infrastructure, i.e., electronic systems that are vital for the economic and physical security of the United States.
External Resources:
Education
Super categories -> Impact of Cybercrime and Cybersecurity -> Main Taxonomy
To address the shortage of cybersecurity professional various educational curricula and courses have been developed.
External Resources:
Economic Impact
Super categories -> Impact of Cybercrime and Cybersecurity -> Main Taxonomy
Cybercrime has an economical impact in two ways. First, businesses and governments need to determine how much money they put into cybersecurity. Second, there is an underground economy for cybercrime tools and services, which involves large sums of money.
External Resources:
Marketplaces
Super categories -> Economic Impact -> Impact of Cybercrime and Cybersecurity -> Main Taxonomy
Marketplaces are websites and hidden places in the internet, where it is possible to buy illegal tools and services to disrupt someone's business or government. It is even possible to buy stolen identities. One such place, the Silk Road, has recently been shut down by Federal Authorities. These paces are usually onlyaccessible through anonymization software.
External Resources:
  • Traveling the Silk Road: A Measurement Analysis of a Large Anonymous Online Marketplace
    Nicolas Christin; Carnegie Mellon University; Proceedings WWW; 2013.
  • TitleTraveling the Silk Road: A Measurement Analysis of a Large Anonymous Online Marketplace
    AuthorNicolas Christin Carnegie Mellon INI/CyLab
    Year2013
    KeywordOnline crime, anonymity, electronic commerce
    AbstractWe perform a comprehensive measurement analysis of Silk Road, an anonymous, international online marketplace that operates as a Tor hidden service and uses Bitcoin as its exchange currency. We gather and analyze data over eight months between the end of 2011 and 2012, including daily crawls of the marketplace for nearly six months in 2012. We obtain a detailed picture of the type of goods sold on Silk Road, and of the revenues made both by sellers and Silk Road operators. Through examining over 24,400 separate items sold on the site, we show that Silk Road is overwhelmingly used as a market for controlled substances and narcotics, and that most items sold are available for less than three weeks. The majority of sellers disappears within roughly three months of their arrival, but a core of 112 sellers has been present throughout our measurement interval. We evaluate the total revenue made by all sellers, from public listings, to slightly over USD 1.2 million per month; this corresponds to about USD 92,000 per month in commissions for the Silk Road operators. We further show that the marketplace has been operating steadily, with daily sales and number of sellers overall increasing over our measurement interval. We discuss economic and policy implications of our analysis and results, including ethical considerations for future research in this area.
  • Russian Underground 101
    Max Goncharov; Research Report; Trend Micro Incorporated; 2012.
Awareness Efforts: Initiatives and Tools
Super categories -> Impact of Cybercrime and Cybersecurity -> Main Taxonomy
Initiatives to consolidate knowledge about dangerous or fraudulent software. Websites and other digital objects that provide information about current threats.
External Resources:
Government
Super categories -> Awareness Efforts: Initiatives and Tools -> Impact of Cybercrime and Cybersecurity -> Main Taxonomy
National cybersecurity initiatives
External Resources:
NCCIC
Super categories -> Government -> Awareness Efforts: Initiatives and Tools -> Impact of Cybercrime and Cybersecurity -> Main Taxonomy
The National Cybersecurity and Communications Integration Center (NCCIC) protects the U.S. cyber infrastructure. Its Cobalt Compartment aims at sharing cybersecurity information with professionals.
External Resources:
CNCI
Super categories -> Government -> Awareness Efforts: Initiatives and Tools -> Impact of Cybercrime and Cybersecurity -> Main Taxonomy
The Comprehensive National Cyber Initiative (CNCI) is an initiative by the President to strengthen the national cyber defense. The initiative encompasses many projects that aim at reinforcing the cyber defense of the United States.
External Resources:
Commercial
Super categories -> Awareness Efforts: Initiatives and Tools -> Impact of Cybercrime and Cybersecurity -> Main Taxonomy
Commercial cybersecurity tools that provide e.g. website safety information.
External Resources:
Web of Trust
Super categories -> Commercial -> Awareness Efforts: Initiatives and Tools -> Impact of Cybercrime and Cybersecurity -> Main Taxonomy
Web of Trust is a browser plugin and website that allows commenting on any website, as well as looking up estimated security rankings from user ratings and third-party sources.
External Resources:
Siteadvisor
Super categories -> Commercial -> Awareness Efforts: Initiatives and Tools -> Impact of Cybercrime and Cybersecurity -> Main Taxonomy
Siteadvisor is a tool by McAfee that displays site ratings in the browser and stops the user when downloading suspicious files or visiting pishing websites.
External Resources:
Norton Safe Web
Super categories -> Commercial -> Awareness Efforts: Initiatives and Tools -> Impact of Cybercrime and Cybersecurity -> Main Taxonomy
Safe Web is a website and browser toolbar similar to Web of Trust. It also allows giving reviews and ratings.
External Resources:
Educational and Research
Super categories -> Awareness Efforts: Initiatives and Tools -> Impact of Cybercrime and Cybersecurity -> Main Taxonomy
Research approaches about bringing .
External Resources:
SmartNotes
Super categories -> Educational and Research -> Awareness Efforts: Initiatives and Tools -> Impact of Cybercrime and Cybersecurity -> Main Taxonomy
SmartNotes is a Chrome Extension and website that allows users to rate websites and store notes, as well as comment on other notes. The goal is not only to provide a rating and a list of notes, but also to use the comments to extract important information. Furthermore, your the stored notes can be displayed when you visit a website again. It can also be a platform where experts help novices decide whether a website is safe.
External Resources:
Technical Aspects of Cybersecurity
Super categories -> Main Taxonomy
Cybersecurity has many technical aspects. The techniques used are important to know and understand how unauthorized or malicious activity is possible in the digital world.
External Resources:
Computer Forensics
Super categories -> Technical Aspects of Cybersecurity -> Main Taxonomy
Cyber Forensics or Computer Forensics is concerned with analyzing the evidence after a cybercrime. Analyzing the traces of a cybercrime yields information about how and why a digital crime was possible to happen.
External Resources:
Data Integrity Verification
Super categories -> Technical Aspects of Cybersecurity -> Main Taxonomy
In order to make sure that data has not been damaged or maliciously altered, data integrity verification techniques are used. These techniques rely either on a cryptographic signature or on logs that can't be changed retroactively.
External Resources:
Quantum Communication
Super categories -> Data Integrity Verification -> Technical Aspects of Cybersecurity -> Main Taxonomy
Using quantum mechanics, it is possible to check whether data has been tampered with. The technique uses photons, which can change their state "when they are measured". Similar techniques can also be used for Quantum Cryptography.
External Resources:
Checksums and Cyclic Redundancy Checks (CRC)
Super categories -> Data Integrity Verification -> Technical Aspects of Cybersecurity -> Main Taxonomy
Checksums and CRCs are functions that calculate a check number from a given file's binary representation. Since everyone can calculate these numbers, they mainly protect against corruption through hardware failures. They are not safe regarding malicious activity.
External Resources:
Tamper-evident Logging
Super categories -> Data Integrity Verification -> Technical Aspects of Cybersecurity -> Main Taxonomy
Checking logs manually or automatically can reveal malicious activity only if logs can't be changed. Therefore, tamper-evident logging techniques make it impossible to change the logs manually.
External Resources:
Hash-based Integrity Verification
Super categories -> Data Integrity Verification -> Technical Aspects of Cybersecurity -> Main Taxonomy
Using cryptographic hash functions allows calculating check numbers, that are unique and can only be calculated by people with the relevant key. If someone changes the data without correctly recalculating the signature number, the tampering will be evident. The techniques used for this are the same as the ones used for message authentication.
External Resources:
  • HTEE: An HMAC based Tamper Evident Encryption
    Bradley Baker, Edward Chow; Proceedings SECRYPT; 2010.
  • TitleHTEE: AN HMAC BASED TAMPER EVIDENT ENCRYPTION
    AuthorBradley Baker and C. Edward Chow†
    Year
    KeywordEncryption, Integrity, Confidentiality, HMAC, Tamper Detection, Hash.
    AbstractThis paper presents a HMAC based Temper Evident Encryption (HTEE) technique for providing confidentiality and integrity of numeric data in a database environment through an encryption scheme based on the keyed Hash Message Authentication Code (HMAC) function. The encryption scheme implemented in this project extends and improves an existing HMAC based encryption scheme. The result is a symmetric encryption process which detects unauthorized updates to ciphertext data, verifies integrity and provides confidentiality. This encryption scheme provides an alternative to standard approaches that offer confidentiality and integrity of data such as combining the Advanced Encryption Standard (AES) algorithm with a hash digest. The purpose of the scheme is to provide a straightforward and efficient encryption that supports data integrity, to investigate the use of HMAC for reversible encryption and key transformation, and to improve upon an existing method. 1 INTRODUCTION
Cryptography
Super categories -> Technical Aspects of Cybersecurity -> Main Taxonomy
Cryptography contains procedures and mathematical functions that allow secure communication. The techniques of cryptography made the commercial internet possible. Various ways to communicate securely exist.
External Resources:
Quantum Cryptography
Super categories -> Cryptography -> Technical Aspects of Cybersecurity -> Main Taxonomy
Using quantum mechanics, it is possible to agree on a key over a public line and be sure that the communication can't be relayed by a man in the middle without distroying the information. The technique uses photons, which can change their state "when they are measured". Similar techniques can also be used for Quantum Communication.
External Resources:
Ciphers
Super categories -> Cryptography -> Technical Aspects of Cybersecurity -> Main Taxonomy
Ciphers are algorithms for making data unreadable for non-authorized people, i.e., encrypting data.
External Resources:
Block Ciphers
Super categories -> Ciphers -> Cryptography -> Technical Aspects of Cybersecurity -> Main Taxonomy
Block ciphers work on fixed-length blocks of data and encrypt these with a symmetric key. There exist strong and well-known block ciphers, such as Triple DES and AES. These methods are often used as base for encryption protocols.
External Resources:
Stream Ciphers
Super categories -> Ciphers -> Cryptography -> Technical Aspects of Cybersecurity -> Main Taxonomy
Stream Ciphers work by combining a key and the data on the fly and for any length of data. The one-time pad is a kind of stream cipher that is theoretically 100% secure, by choosing a random key that is of the same length as the data, however this is impractical and it assumes that the key can't be stolen.
External Resources:
Hash Functions
Super categories -> Cryptography -> Technical Aspects of Cybersecurity -> Main Taxonomy
Cryptographic hash functions calculate a short number from a file input. Special about these functions is that it is very hard to create a possible input file from a given hash number. Also given a message it is very hard to find a different message, which yields the same output number. These properties are called preimage resistance and second preimage resistance. Hash functions are used for a variety of purposes, such as Data Integrity Verification and message authentication.
External Resources:
MD-5
Super categories -> Hash Functions -> Cryptography -> Technical Aspects of Cybersecurity -> Main Taxonomy
MD-5 is a hash function that was used as a standard in the past. However, by now efficient attacks have been found and therefore, MD-5 is not considered secure anymore.
External Resources:
  • Fast Collision Attack on MD5
    Tao Xie, Fanbao Liu, Dengguo Feng; IACR Cryptology; 2013.
  • TitleFast Collision Attack on MD5
    AuthorTao Xie, Fanbao Liu, Dengguo Feng
    Year2010
    KeywordHash Function; MD5 Differential Cryptanalysis; Collision Attack; Single-Block Collision
    AbstractWe presented the first single block collision attack on MD5 with complexity of 2 pressions and posted the challenge for another completely new one in 2010. Last year, Stevens presented a single block collision attack to our challenge, with complexity of 2 Stevens’s hard work. However, it is a pity that he had not found even a better solution than our original one, let alone a completely new one and the very optimal solution that we preserved and have been hoping that someone can find it, whose collision complexity is about 2 method how to choose the optimal input difference for generating MD5 collision pairs. First, we divide the sufficient conditions into two classes: strong conditions and weak conditions, by the degree of difficulty for condition satisfaction. Second, we prove that there exist strong conditions in only 24 steps (one and a half rounds) under specific conditions, by utilizing the weaknesses of compression functions of MD5, which are difference inheriting and message expanding. Third, there should be no difference scaling after state word q so that it can result in the least number of strong conditions in each differential path, in such a way we deduce the distribution of strong conditions for each input difference pattern. Finally, we choose the input difference with the least number of strong conditions and the most number of free message words. We implement the most efficient 2-block MD5 collision attack, which needs only about 2 pair, and show a single-block collision attack with complexity 2 41 MD5 compressions. In this paper, we propose a
RIPEMD
Super categories -> Hash Functions -> Cryptography -> Technical Aspects of Cybersecurity -> Main Taxonomy
RIPEMD is an ISO-standard hash function, which is often compared to SHA-1.
External Resources:
  • Differential Attacks on Reduced RIPEMD-160
    Florian Mendel, Tomislav Nad, Stefan Scherz, Martin Schläffer; Proceedings Information Security Conference; 2012.
  • TitleDifferential Attacks on Reduced RIPEMD-160
    AuthorFlorian Mendel, Tomislav Nad, Stefan Scherz, and Martin Schl ̈
    Year2012
    Keywordhash functions, cryptanalysis, semi-free-start collisions.
    AbstractIn this work, we provide the first security analysis of reduced RIPEMD-160 regarding its collision resistance with practical complexity. The ISO/IEC standard RIPEMD-160 was proposed 15 years ago and may be used as a drop-in replacement for SHA-1 due to their same hash output length. Only few results have been published for RIPEMD-160 so far and most attacks have a complexity very close to the generic bound. In this paper, we present the first application of the attacks of Wang et al. on MD5 and SHA-1 to RIPEMD-160. Due to the dual-stream structure of RIPEMD-160 the application of these attacks is nontrivial and almost impossible without the use of automated tools. We present practical examples of semi-free-start near-collisions for the middle 48 steps (out of 80) and semi-free-start collisions for 36 steps of RIPEMD-160. Furthermore, our results show that the differential characteristics get very dense in RIPEMD-160 such that a full-round attack seems unlikely in the near future.
SHA-3
Super categories -> Hash Functions -> Cryptography -> Technical Aspects of Cybersecurity -> Main Taxonomy
The Secure Hash Algorithm (SHA) is a standard by the National Institute of Standards and Technology (NIST). SHA-3 will be the future standard based on the hash algorithm Keccak. SHA-1 and SHA-2 are not technically related to SHA-3. As for security, for SHA-1 there are known theoretical attacks and SHA-2 is still considered secure. SHA-3 will allow more flexibility also introducing a parameter for a speed-security tradeoff.
External Resources:
Public-Key Cryptography
Super categories -> Cryptography -> Technical Aspects of Cybersecurity -> Main Taxonomy
Public-key cryptography, also called asymmetric cryptography, allows encrypting data with a different key than decrypting it. Furthermore the public key can't be used to infer the private key. This can be used for digital signatures, since it is possible to verify with the public key of a person, whether a message was signed with their private key. It mitigates the problem of key exchange for some applications.
External Resources:
Diffie-Hellman Key Exchange
Super categories -> Public-Key Cryptography -> Cryptography -> Technical Aspects of Cybersecurity -> Main Taxonomy
The Diffie-Hellman Key Exchange is a procedure for exchanging secret keys without prior knowledge over an insecure communication channel. This can be used to agree on a password when no secure communication is possible.
External Resources:
RSA
Super categories -> Public-Key Cryptography -> Cryptography -> Technical Aspects of Cybersecurity -> Main Taxonomy
RSA is the most well-known public-key algorithm. It was invented by Ron Rivest, Adi Shamir and Leonard Adleman and is named after its inventors. It describes how to calculate a public and private key that can be used for asymmetric cryptography. It can be used for Digital Signatures technology.
External Resources:
Intrusion Detection & Risk Mitigation
Super categories -> Technical Aspects of Cybersecurity -> Main Taxonomy
Todays multi-tasking computer systems allow attackers to intrude a system without the user noticing any change. Intrusion detection mechanisms try to detect external intrusion attempts and block them. Risk mitigation strategies try to preemptively counter possible attack scenarios.
External Resources:
Malware
Super categories -> Intrusion Detection & Risk Mitigation -> Technical Aspects of Cybersecurity -> Main Taxonomy
Malware is software designed to damage a computer or make access possible for intruders. Malware detection tries to detect malware, in order to prevent damage.
External Resources:
Viruses
Super categories -> Malware -> Intrusion Detection & Risk Mitigation -> Technical Aspects of Cybersecurity -> Main Taxonomy
A virus is a self-replicating software that usually performs some sort of damaging activity and tries to spread out. A virus attaches to existing programs and causes them to malfunction or perform malicious activities.
External Resources:
  • A Taxonomy of Network and Computer Attacks
    Simon Hansman, Ray Hunt; Computers & Security; no. 1 vol. 24; 2005.
  • Titlecomputer attacks A taxonomy of network and
    AuthorSimon Hansman, Ray Hunt
    Year2005
    KeywordTaxonomy; Computer attack; Network attack; Classification scheme; Attack vector; Attack target; CERT
    AbstractAttacks over the years have become both increasingly numerous and sophisticated. This paper focuses on the provisioning of a method for the analysis and categorisation of both computer and network attacks, thus providing assistance in combating new attacks, improving computer and network security as well as providing consistency in language when describing attacks. Such a taxonomy is designed to be useful to information bodies such as CERTs (Computer Emergency Response Teams) who have to handle and categorise an every increasing number of attacks on a daily basis. Information bodies could use the taxonomy to communicate more effectively as the taxonomy would provide a common classification scheme. The proposed taxonomy consists of four dimensions which provide a holistic taxonomy in order to deal with inherent problems in the computer and network attack field. The first dimension covers the attack vector and the main behaviour of the attack. The second dimension allows for classification of the attack targets. Vulnerabilities are classified in the third dimension and payloads in the fourth. Finally, to demonstrate the usefulness of this taxonomy, a case study applies the taxonomy to a number of well known attacks. a 2005 Elsevier Ltd. All rights reserved.
Worms
Super categories -> Malware -> Intrusion Detection & Risk Mitigation -> Technical Aspects of Cybersecurity -> Main Taxonomy
A worm is a malicious program, which spreads itself across networks. In contrast to a virus, it does not attach to another program but is a program itself.
External Resources:
  • Recent Worms: A Survey and Trends
    Darrell M. Kienzle, Matthew C. Elder; Proceedings Rapid Malcode WORM; 2003.
  • TitleRecent Worms: A Survey and Trends
    AuthorMatthew C. Elder
    Year2003
    KeywordMalicious code, survey.
    AbstractIn this paper, we present a broad overview of recent worm activity. Virus information repositories, such as the Network Associates' Virus Information Library, contain over 4500 different entries (through the first quarter of 2003). While many of these entries are interesting, a great number of them are now simply historical and a large percentage of them are completely derivative in nature. However, these virus information repositories are the best source of material on the breadth of malicious code, including worms.
  • Design Space and Analysis of Worm Defense Strategies
    David Brumley, Li-Hao Liu, Pongsin Poosankam, Dawn Song; Proceedings ASIACCS; 2006.
  • TitleDesign Space and Analysis of Worm Defense Strategies
    AuthorDavid Brumley Li-Hao Liu Pongsin Poosankam Dawn Song
    Year2006
    Keywordworms, worm propagation, worm taxonomy, defense strategy analysis, proactive protection, blacklisting, antibody, local containment
    AbstractWe give the first systematic investigation of the design space of worm defense system strategies. We accomplish this by providing a taxonomy of defense strategies by abstracting away implementation-dependent and approach-specific details and concentrating on the fundamental properties of each defense category. Our taxonomy and analysis reveals the key parameters for each strategy that determine its effectiveness. We provide a theoretical foundation for understanding how these parameters interact, as well as simulationbased analysis of how these strategies compare as worm defense systems. Finally, we offer recommendations based upon our taxonomy and analysis on which worm defense strategies are most likely to succeed. In particular, we show that a hybrid approach combining Proactive Protection and Reactive Antibody Defense is the most promising approach and can be effective even against the fastest worms such as hitlist worms. Thus, we are the first to demonstrate with theoretic and empirical models which defense strategies will work against the fastest worms such as hitlist worms.
Trojans
Super categories -> Malware -> Intrusion Detection & Risk Mitigation -> Technical Aspects of Cybersecurity -> Main Taxonomy
Trojans are programs which install backdoors into systems, i.e., they create a hidden security hole in the system from the inside in order to allow installation of further malicious code.
External Resources:
Blended Threats
Super categories -> Malware -> Intrusion Detection & Risk Mitigation -> Technical Aspects of Cybersecurity -> Main Taxonomy
The combination of various malware is a blended threat. Such threats can be very complex.
External Resources:
Bugs
Super categories -> Malware -> Intrusion Detection & Risk Mitigation -> Technical Aspects of Cybersecurity -> Main Taxonomy
Malware exploits software bugs to gain access or privileges on a computer. Finding and preventing bugs is therefore an important part to reduce vulnerability to malware.
External Resources:
Rootkits
Super categories -> Malware -> Intrusion Detection & Risk Mitigation -> Technical Aspects of Cybersecurity -> Main Taxonomy
A rootkit attaches to the core of the operating system (kernel) in order to hide certain processes from the typical supervision. In particular, it can hide various forms of malware from detection software.
External Resources:
Spyware
Super categories -> Malware -> Intrusion Detection & Risk Mitigation -> Technical Aspects of Cybersecurity -> Main Taxonomy
Spyware collects information about people without their knowledge. It's typically a stealth program that observes what action the user takes.
External Resources:
Scareware
Super categories -> Malware -> Intrusion Detection & Risk Mitigation -> Technical Aspects of Cybersecurity -> Main Taxonomy
Scareware is malware that disables user functionality or threatens to publicize private information. Typically a ransom is demanded in order to restore computer functionality or retain the privacy of the information.
External Resources:
  • Detecting Scareware by Mining Variable Length Instruction Sequences
    Raja Khurram Shahzad, Niklas Lavesson; Proceedings Information Security South Africa; 2011.
  • TitleDetecting Scareware by Mining Variable Length Instruction Sequences
    AuthorRaja Khurram Shahzad Niklas Lavesson
    Year
    KeywordScareware; Instruction Sequence; Classification
    AbstractScareware is a recent type of malicious software that may pose financial and privacy-related threats to novice users. Traditional countermeasures, such as anti-virus software, require regular updates and often lack the capability of detecting novel (unseen) instances. This paper presents a scareware detection method that is based on the application of machine learning algorithms to learn patterns in extracted variable length opcode sequences derived from instruction sequences of binary files. The patterns are then used to classify software as legitimate or scareware but they may also reveal interpretable behavior that is unique to either type of software. We have obtained a large number of real world scareware applications and designed a data set with 550 scareware instances and 250 benign instances. The experimental results show that several common data mining algorithms are able to generate accurate models from the data set. The Random Forest algorithm is shown to outperform the other algorithms in the experiment. Essentially, our study shows that, even though the differences between scareware and legitimate software are subtler than between, say, viruses and legitimate software, the same type of machine learning approach can be used in both of these dissimilar cases.
Denial of Service
Super categories -> Intrusion Detection & Risk Mitigation -> Technical Aspects of Cybersecurity -> Main Taxonomy
A Denial of Service (DoS) attack aims at disrupting a service by overloading its computational resources with meaningless requests. In particular botnets are used for Distributed Denial of Service (DDoS) attacks, in order to 'crash' whole websites.
External Resources:
  • A Multifaceted Approach to Understanding the Botnet Phenomenon
    Moheeb Abu Rajab, Jay Zarfoss, Fabain Monrose, Andreas Terzis; Proceedings Internet measurement conference IMC; 2006.
  • TitleA Multifaceted Approach to Understanding the Botnet Phenomenon
    Author
    Year2006
    KeywordBotnets, Computer Security, Malware, Network Security
    AbstractThe academic community has long acknowledged the existence of malicious botnets, however to date, very little is known about the behavior of these distributed computing platforms. To the best of our knowledge, botnet behavior has never been methodically studied, botnet prevalence on the Internet is mostly a mystery, and the botnet life cycle has yet to be modeled. Uncertainty abounds. In this paper, we attempt to clear the fog surrounding botnets by constructing a multifaceted and distributed measurement infrastructure. Throughout a period of more than three months, we used this infrastructure to track 192 unique IRC botnets of size ranging from a few hundred to several thousand infected end-hosts. Our results show that botnets represent a major contributor to unwanted Internet traffic—27% of all malicious connection attempts observed from our distributed darknet can be directly attributed to botnetrelated spreading activity. Furthermore, we discovered evidence of botnet infections in 11% of the 800,000 DNS domains we examined, indicating a high diversity among botnet victims. Taken as a whole, these results not only highlight the prominence of botnets, but also provide deep insights that may facilitate further research to curtail this phenomenon.
  • A Taxonomy of DDoS Attack and DDoS Defense Mechanisms
    Jelena Mirkovic, Peter Reiher; ACM SIGCOMM Computer Communication Review; no. 2 vol. 24; 2004.
Intrusion Detection
Super categories -> Intrusion Detection & Risk Mitigation -> Technical Aspects of Cybersecurity -> Main Taxonomy
Techniques for intrusion detection try to identify suspicious activity by monitoring communication of the computer permanently.
External Resources:
  • Intrusion and Intrusion Detection
    John McHugh; International Journal of Information Security; vol. 1; 2001.
  • TitleIntrusion and intrusion detection
    AuthorJohn McHugh
    Year2001
    KeywordComputer misuse – Intrusion detection – Intrusive anomalies – Intrusion signatures – Intrusion detection systems (IDS) – IDS evaluation
    AbstractAssurance technologies for computer security have failed to have significant impacts in the marketplace, with the result that most of the computers connected to the internet are vulnerable to attack. This paper looks at the problem of malicious users from both a historical and practical standpoint. It traces the history of intrusion and intrusion detection from the early 1970s to the present day, beginning with a historical overview. The paper describes the two primary intrusion detection techniques, anomaly detection and signature-based misuse detection, in some detail and describes a number of contemporary research and commercial intrusion detection systems. It ends with a brief discussion of the problems associated with evaluating intrusion detection systems and a discussion of the difficulties associated with making further progress in the field. With respect to the latter, it notes that, like many fields, intrusion detection has been based on a combination of intuition and brute-force techniques. We suspect that these have carried the field as far as they can and that further significant progress will depend on the development of an underlying theoretical basis for the field.
  • State of the Practice of Intrusion Detection Technologies
    Julia H. Allen, Alan M. Christie, William L. Fithen, John McHugh, Jed Pickel, Ed Stoner; Technical Report; Software Engineering Institute CMU; 2000.
Authentication & Authorization
Super categories -> Technical Aspects of Cybersecurity -> Main Taxonomy
Authentication means identifying a user or message as valid. Authorization is concerned with what a authenticated user can do based on his permissions.
External Resources:
User Authentication
Super categories -> Authentication & Authorization -> Technical Aspects of Cybersecurity -> Main Taxonomy
User authentication deals with identifying valid users. A user can be identified in three ways, it's either something they know (knowledge-based), something they have (token-based) or something they are (biometric).
External Resources:
Knowledge-based Authentication
Super categories -> User Authentication -> Authentication & Authorization -> Technical Aspects of Cybersecurity -> Main Taxonomy
Knowledge-based authentication is based on something only the user knows, such as, a password, PIN or private information such as your first pet's name, your SSN or similar security questions. In order for this to be safe there needs to be a trusted path to transmit the password or zero-knowledge passwords, which don't expose the real secret.
External Resources:
Knowledge-based Authentication Attacks
Super categories -> Knowledge-based Authentication -> User Authentication -> Authentication & Authorization -> Technical Aspects of Cybersecurity -> Main Taxonomy
Attacks on the user secrets can happen during authentication, or separately, e.g. by tricking the user into telling the password or by guessing the password.
External Resources:
  • The Knowledge Based Authentication Attacks
    Farnaz Towhidi, Azizah Abdul Manaf, Salwani Mohd Daud, Arash Habibi Lashkari; Proceedings Security & Management; 2011.
  • TitleThe Knowledge Based Authentication Attacks
    AuthorFarnaz Towhidi, Azizah Abdul Manaf, Salwani Mohd Daud, Arash Habibi Lashkari Password Brute Force
    Year
    KeywordAuthentication Attack, Graphical Password Attacks, Knowledge Based Attacks, Recognition Based Attacks, Recall based Attacks.
    AbstractKnowledge Based authentication is still the most widely used and accepted technique for securing resources from unauthorized access for its simplicity, ease of revocation and legacy deployment which divides to textual and graphical password. Over the last decade several attacks records for stealing user’s identity and confidential information using a single or combination of attacks. In this paper the attacks pattern of textual and graphical password describes according to CAPEC standard, following describing their effects on both conventional and image password. More over some categories lacks from detail research which highlighted and will select as future work.
Keylogging
Super categories -> Knowledge-based Authentication Attacks -> Knowledge-based Authentication -> User Authentication -> Authentication & Authorization -> Technical Aspects of Cybersecurity -> Main Taxonomy
Keylogging is performed by Malware, which records what the user types, hence, also records passwords.
External Resources:
Man in the Middle
Super categories -> Knowledge-based Authentication Attacks -> Knowledge-based Authentication -> User Authentication -> Authentication & Authorization -> Technical Aspects of Cybersecurity -> Main Taxonomy
A Man in the Middle attack works by making the user believe he is talking to the valid server and making the server believe he is talking to a valid user, while in reality they communicate with a malicious relay that can record the transmitted information and in worst case alter the information.
External Resources:
Social Engineering
Super categories -> Knowledge-based Authentication Attacks -> Knowledge-based Authentication -> User Authentication -> Authentication & Authorization -> Technical Aspects of Cybersecurity -> Main Taxonomy
Social Engineering works by preying on people's goodwill or naiveness, by asking the user for private information or other factors that could make it easier to get passwords or access.
External Resources:
Bruteforce and Dictionary Attacks
Super categories -> Knowledge-based Authentication Attacks -> Knowledge-based Authentication -> User Authentication -> Authentication & Authorization -> Technical Aspects of Cybersecurity -> Main Taxonomy
One of the oldest ways of cracking passwords is just guessing. Either by trying all possible passwords or a certain amount of likely passwords. Even nowadays many users use simple passwords so this might be successful quite often.
External Resources:
  • Fast Dictionary Attacks on Passwords Using Time-space Tradeoff
    Arvind Narayanan, Vitaly Shmatikov; Proceedings Computer and Communications Security CCS; 2005.
  • TitleFast Dictionary Attacks on Passwords Using Time-Space Tradeoff
    AuthorArvind Narayanan and Vitaly Shmatikov
    Year2005
    KeywordPasswords, Dictionary Attack, Time-Space Tradeoff, Cryptanalysis, Markov Models
    AbstractHuman-memorable passwords are a mainstay of computer security. To decrease vulnerability of passwords to bruteforce dictionary attacks, many organizations enforce complicated password-creation rules and require that passwords include numerals and special characters. We demonstrate that as long as passwords remain human-memorable, they are vulnerable to “smart-dictionary” attacks even when the space of potential passwords is large. Our first insight is that the distribution of letters in easyto-remember passwords is likely to be similar to the distribution of letters in the users’ native language. Using standard Markov modeling techniques from natural language processing, this can be used to dramatically reduce the size of the password space to be searched. Our second contribution is an algorithm for efficient enumeration of the remaining password space. This allows application of time-space tradeoff techniques, limiting memory accesses to a relatively small table of “partial dictionary” sizes and enabling a very fast dictionary attack. We evaluated our method on a database of real-world user password hashes. Our algorithm successfully recovered 67.6% of the passwords using a 2 × 10 a much higher percentage than Oechslin’s “rainbow” attack, which is the fastest currently known technique for searching large keyspaces. These results call into question viability of human-memorable character-sequence passwords as an authentication mechanism.
Physical Access to Computer
Super categories -> Knowledge-based Authentication Attacks -> Knowledge-based Authentication -> User Authentication -> Authentication & Authorization -> Technical Aspects of Cybersecurity -> Main Taxonomy
Many Users save their passwords in a password manager, often it is enough to be able at the physical machine to read this passwords out.
External Resources:
Token-based Authentication
Super categories -> User Authentication -> Authentication & Authorization -> Technical Aspects of Cybersecurity -> Main Taxonomy
This kind of authentication relies on the user possessing something unique (a token), such as a badge. When someone presents this token it is believed that it's the user. Therefore, theft is one attack on token-based authentication.
External Resources:
RFID
Super categories -> Token-based Authentication -> User Authentication -> Authentication & Authorization -> Technical Aspects of Cybersecurity -> Main Taxonomy
Radio Frequency Identification (RFID) is a wireless communication technology, that allows badges and passports to be checked without physical contact. Since the wireless communication might be readable for people nearby, security is a main concern.
External Resources:
Smart Cards
Super categories -> Token-based Authentication -> User Authentication -> Authentication & Authorization -> Technical Aspects of Cybersecurity -> Main Taxonomy
Smart Cards are cards or badges that have an integrated circuit, such cards can be used for authentication.
External Resources:
Biometric Authentication
Super categories -> Authentication & Authorization -> Technical Aspects of Cybersecurity -> Main Taxonomy
Biometrics are properties of the human body that can be measured and characterize a person. Such methods are attractive because they refer to the physical body of the user, which is hard to steal. Popular methods include fingerprints and iris images.
External Resources:
Fingerprint
Super categories -> Biometric Authentication -> Authentication & Authorization -> Technical Aspects of Cybersecurity -> Main Taxonomy
Fingerprints are unique to every person. As such they are well suited for authentication.
External Resources:
  • A Survey on Biometric Fingerprints: The Cardless Payment System
    Dileep Kumar, Yeonseung Ryu, Dongseop Kwon; Proceedings ISBAST; 2012.
  • TitleA Survey on Biometric Fingerprints: The Cardless Payment System
    AuthorDileep Kumar, Dr.Yeonseung Ryu, Dr.Dongseop Kwon
    Year2008
    KeywordBiometric, Fingerprints, Card less - Payment System.
    AbstractIn daily life people use credit cards for shopping, check card, bus card, subway card for traveling, student card for library and department, and many kinds of cards for unlimited purposes and etc. So problem is that a person has to take many cards and has to remember their passwords or secret codes and to keep secure to take with him all time. In this paper biometric the fingerprints payment system is used for various kinds of payment system instead of the tension of cards to place with them and to memorize theirs difficult passwords. Biometric fingerprints payment system is much safe and secure and very easy to use and even without using any password or secret codes to remember as compare with previous system like credit card payment system, wireless system and mobile system etc. Biometric fingerprints payment system is reliable and expensive and it has more advantages as compare with others.
Iris
Super categories -> Biometric Authentication -> Authentication & Authorization -> Technical Aspects of Cybersecurity -> Main Taxonomy
The shape and color of the iris is unique to every person including identical twins. Since in contrast to retina scans it can be performed without being very close to the scanner with the eye, it is more acceptable.
External Resources:
  • Adoption of Iris-Based Authentication
    S. Mohammadi, A. Kaldi; Proceedings IEEM; 2008.
  • TitleAdoption of Iris-Based Authentication
    Author
    Year2008
    KeywordAuthentication, biometrics, iris recognition, technology adoption
    AbstractEven though iris-based systems have proven to be very promising in a world where security is crucial, surprisingly enough, this means of authentication has not been given a very warm welcome from the users. In order to appropriately confront this issue, critical success factors of the deployment of networked-based systems for iris authentication - namely technical, human, and implementation aspects, as well as necessary policies and standards - need to be carefully considered. One of the major success factors is the adoption issue concerning this relatively new technology. The decision to adopt iris-based authentication is influenced by many factors, including user characteristics, social factors, and technology characteristics. Addressing these key factors is extremely valuable for the successful implementation of iris-based technology.
Voice Print
Super categories -> Biometric Authentication -> Authentication & Authorization -> Technical Aspects of Cybersecurity -> Main Taxonomy
Authentication through voice is convenient but not yet mature enough for high security applications.
External Resources:
  • Voice Authentication Using Short Phrases: Examining Accuracy, Security and Privacy Issues
    R.C. Johnson, Terrance E. Boult, Walter J. Scheirer; Proceedings BTAS; 2013.
  • TitleExamining Accuracy, Security and Privacy Issues Voice Authentication Using Short Phrases:
    AuthorUniversity of Colorado, Colorado Springs R.C. Johnson, Terrance E. Boult Walter J. Scheirer Harvard University
    Year
    Keyword
    AbstractThis paper examines a novel security model for voice biometrics that decomposes the overall problem into bits of “biometric identity security,” bits of “knowledge security,” and bits of “traditional encryption security.” This is the first paper to examine balancing security gained from text-dependent and text-independent voice biometrics under this model. Our formulation allows for text-dependent voice biometrics to address both what you know and who you are. A text-independent component is added to defeat replay attacks. Further, we experimentally examine an extension of the recently introduced Vaulted Voice Verification protocol and the security tradeoffs of adding these elements. We show that by mixing text-dependent with text-independent voice verification and by expanding the challenge-response protocol, Vaulted Voice Verification can preserve privacy while addressing the problematic issues of voice as a remote/mobile biometric identifier. The resulting model supports both authentication and key release with the matching taking place client side, where a mobile device may be used. This novel security model addresses a real and crucial problem: that of security on a mobile device.
Hand Geometry
Super categories -> Biometric Authentication -> Authentication & Authorization -> Technical Aspects of Cybersecurity -> Main Taxonomy
The growth, shape and line structure of each hand is different. Therefore, the hand shape can be used as a biometric authentication property.
External Resources:
  • A Survey of Biometric Technology Based on Hand Shape
    Nicolae Duta; Pattern Recognition; no. 11 vol. 42; 2009.
  • TitleA survey of biometric technology based on hand shape
    AuthorNicolae Duta
    Year2009
    KeywordBiometric systems Hand shape Hand geometry
    AbstractAutomated biometric systems have emerged as a more reliable alternative to the traditional personal identification solutions. One of the most popular biometrics is hand shape due to its ease of use, non-intrusiveness and public acceptance. This paper presents a survey of the technology used in hand shape-based biometric systems. We first review the component modules including the algorithms they employ. Next we discuss system taxonomies, performance evaluation methodologies, testing issues and US government evaluations. A summary of the accuracy results reported in the literature is also provided. We next describe some of the commercial hand shape biometric systems as well as some recent successful deployments. Finally, we mention a few limitations of the hand shape biometric and give some directions for future research.
Message Authentication
Super categories -> Authentication & Authorization -> Technical Aspects of Cybersecurity -> Main Taxonomy
Message Authentication is concerned with certifying that a message was sent by the person who it claims and also asserting that the message was not modified, which overlaps with Data Integrity Verification
External Resources:
Digital Signatures
Super categories -> Message Authentication -> Authentication & Authorization -> Technical Aspects of Cybersecurity -> Main Taxonomy
A digital signature use Public-Key Cryptography for ensuring the validity of a message. A message is signed with the private key of the sender and the receiver can verify with the public key that the file was truly sent by the claimed sender, as well as that it was not altered. In addition, a digital signature ensures non-repudiation, i.e., the sender can't claim he did not send the message.
External Resources:
  • Digital Signature
    Ravneet Kaur, Amandeep Kaur; Proceedings ICCS; 2012.
  • TitleDIGITAL SIGNATURE
    AuthorRavneet Kaur, Amandeep Kaur
    Year2012
    KeywordEncryption, Hashing, Public Key Encryption, Authentication, Privacy, Information Security
    AbstractThere are different types of encryption techniques are being used to ensure the privacy of data transmitted over internet. Digital Signature is a mathematical scheme which ensures the privacy of conversation, integrity of data, authenticity of digital message/sender and non-repudiation of sender. Digital Signature is embedded in some hardware device or also exits as a file on a storage device. Digital Signature are signed by third party some certifying authority. This paper describe the different key factor of digital signature with the working of digital signature, through various methods and procedures involved in signing the data or message by using digital signature. It introduces algorithms used in digital signatures.
MAC and HMAC
Super categories -> Message Authentication -> Authentication & Authorization -> Technical Aspects of Cybersecurity -> Main Taxonomy
Message authentication code (MAC) and keyed-hash message authentication code (HMAC) are procedures to ensure the validity of a message. In addition to the message a MAC is sent and the receiver can calculate the MAC from the message and previously known key and compare whether the message still yields the same MAC in which case it can be trusted. HMAC offers improved security by using a more complex calculation scheme for the MAC.
External Resources:
Authorization
Super categories -> Authentication & Authorization -> Technical Aspects of Cybersecurity -> Main Taxonomy
Authorization is concerned with checking that authenticated users can only perform actions for which they have the permission.
External Resources:
Authorization Models
Super categories -> Authorization -> Authentication & Authorization -> Technical Aspects of Cybersecurity -> Main Taxonomy
There are different models of authorization. Either permissions are a property of each user, or each user has one or more roles and a role has associated permissions.
External Resources:
Role-based Access Control
Super categories -> Authorization Models -> Authorization -> Authentication & Authorization -> Technical Aspects of Cybersecurity -> Main Taxonomy
In Role-based Access Control, a user has one or more roles. When performing an action he acts in one of those roles and the chosen role determines his permissions.
External Resources:
Provenance-based Access Control
Super categories -> Role-based Access Control -> Authorization Models -> Authorization -> Authentication & Authorization -> Technical Aspects of Cybersecurity -> Main Taxonomy
Provenance is the documentation of the origin. Such data can be used to determine if a user request is legitimate and whether access should be granted.
External Resources:
  • A Provenance-based Access Control Model
    Jaehong Park, Dang Nguyen and Ravi Sandhu; Proceedings PST; 2012.
  • TitleA Provenance-based Access Control Model
    AuthorRavi Sandhu
    Year2012
    Keyword
    AbstractExistence of data provenance information in a system raises at least two security-related issues. One is how provenance data can be used to enhance security in the system and the other is how to protect provenance data which might be more sensitive than the data itself. Recent data provenancerelated access control literature mainly focuses on the latter issue of protecting provenance data. In this paper, we propose a novel provenance-based access control model that addresses the former objective. Using provenance data for access control to the underlying data facilitates additional capabilities beyond those available in traditional access control models. We utilize a notion of dependency as the key foundation for access control policy specification. Dependency-based policy provides simplicity and effectiveness in policy specification and access control administration. We show our model can support dynamic separation of duty, II. P D ROVENANCE ATA
Permission-based Access Control
Super categories -> Authorization Models -> Authorization -> Authentication & Authorization -> Technical Aspects of Cybersecurity -> Main Taxonomy
Permission-based access control assigns permissions to users. It can be extended by concepts such as groups and inheritance, which make it more similar to role-based methods.
External Resources:
Privilege Escalation
Super categories -> Authorization -> Authentication & Authorization -> Technical Aspects of Cybersecurity -> Main Taxonomy
The main attack against authorization methods is privilege escalations. There are two kinds of privilege escalation. Horizontal privilege escalation tries to get access to resources of other users with the same privilege level, e.g. reading their private messages. Vertical privilege escalation attempts to get higher privileges, for instance permissions for administrative tasks, such as adding new users.
External Resources:
  • Preventing Privilege Escalation
    Niels Provos, Markus Friedl, Peter Honeymanl; 2002.
  • TitlePreventing Privilege Escalation
    AuthorNiels Provos CITI, University of Michigan Markus Friedl GeNUA Peter Honeyman CITI, University of Michigan
    Year
    Keyword
    AbstractMany operating system services require special privilege to execute their tasks. A programming error in a privileged service opens the door to system compromise in the form of unauthorized acquisition of privileges. In the worst case, a remote attacker may obtain superuser privileges. In this paper, we discuss the methodology and design of privilege separation, a generic approach that lets parts of an application run with different levels of privilege. Programming errors occurring in the unprivileged parts can no longer be abused to gain unauthorized privileges. Privilege separation is orthogonal to capability systems or application confinement and enhances the security of such systems even further. Privilege separation is especially useful for system services that authenticate users. These services execute privileged operations depending on internal state not known to an application confinement mechanism. As a concrete example, the concept of privilege separation has been implemented in OpenSSH. However, privilege separation is equally useful for other authenticating services. We illustrate how separation of privileges reduces the amount of OpenSSH code that is executed with special privilege. Privilege separation prevents known security vulnerabilities in prior OpenSSH versions including some that were unknown at the time of its implementation.
Auto-Analysis of Legitimate Usage Patterns
Super categories -> Technical Aspects of Cybersecurity -> Main Taxonomy
Even authenticated and authorized users may have malicious intentions. To prevent such an insider attack constant monitoring is necessary. For this purpose, automatic usage pattern analysis techniques can be used to alert administrators if unusual behavior is observed.
External Resources:
Insider Threat Detection
Super categories -> Auto-Analysis of Legitimate Usage Patterns -> Technical Aspects of Cybersecurity -> Main Taxonomy
The detection of insider attacks relies on seeing new patterns that are very different from previous usage patterns.
External Resources:
Insider Threat Prevention
Super categories -> Auto-Analysis of Legitimate Usage Patterns -> Technical Aspects of Cybersecurity -> Main Taxonomy
Preventing insider attacks is difficult. One aspect is making data access as transparent as possible, since it allows everyone to check for suspicious activity, but there are different considerations as well.
External Resources:
  • Towards Mechanisms for Detection and Prevention of Data Exfiltration by Insiders
    Elisa Bertino, Gabriel Ghinita; Proceedings ASIACCS; 2011.
  • TitleTowards Mechanisms for Detection and Prevention of Data Exfiltration by Insiders
    AuthorKeynote Talk Paper Elisa Bertino Gabriel Ghinita
    Year2011
    KeywordInsider Threat, Data Exfiltration.
    AbstractData represent an extremely important asset for any organization. Confidential data such as military secrets or intellectual property must never be disclosed outside the organization. Therefore, one of the most severe threats in the case of cyber-insider attacks is the loss of confidential data due to exfiltration. A malicious insider who has the proper credentials to access the organization databases may, over time, send data outside the organization network through a variety of channels, such as email, crafted HTTP requests that encapsulate data, etc. Existing security tools for detection of cyber-attacks focus on protecting the boundary between the organization and the outside world. Numerous network-level intrusion detection systems (IDS) exist, which monitor the traffic pattern and attempt to infer anomalous behavior. While such tools may be effective in protecting against external attacks, they are less suitable when the data exfiltration is performed by an insider who has the proper credentials and authorization to access resources within the organization. In this paper, we argue that DBMS-layer detection and prevention systems are the best alternative to defend against data exfiltration because: (1) DBMS access is performed through a standard, unique language (SQL) with well-understood semantics; (2) monitoring the potential disclosure of confidential data is more effective if done as close as possible to the data source; and (3) the DBMS layer already has in place a thorough mechanism for enforcing access control based on subject credentials. By analyzing the pattern of interaction between subjects and the DBMS, it is possible to detect anomalous activity that is indicative of early signs of exfiltration. In the paper, we outline a taxonomy of cyber-insider dimensions of activities that are indicative of data exfiltration, and we discuss a high-level architecture and mechanisms for early detection of exfiltration by insiders. We also outline a virtualization-based mechanism that prevents insiders from exfiltrating data, even in the case when they manage to gain control over the network. The protection mechanism relies on explicit authorization of data transfers that cross the organizational boundary.
Insider Threat Mitigation
Super categories -> Auto-Analysis of Legitimate Usage Patterns -> Technical Aspects of Cybersecurity -> Main Taxonomy
After detecting insider threats, it is important to close the information path as good as possible. Also an insider might have anticipated its termination and could have implemented backdoors, hence, there is a need for monitoring suspicious activity.
External Resources: