SlideShare a Scribd company logo
www.syrres.com
Copyright © 2004
A Multi-Disciplinary Approach for
A Multi-Disciplinary Approach for
Countering Insider Threats
Countering Insider Threats
Secure Knowledge Management
(SKM 2004)
September 23-24, 2004
Marriott Buffalo-Niagara
Amherst, NY USA
Robert DelZoppo, Eric Brown, Matt Downey: Syracuse Research Corporation
Michael D’Eredita, Elizabeth D. Liddy, Joon S. Park, Anand Natarajan, Svetlana Symonenko,
Shuyuan M. Ho : Syracuse University
www.syrres.com
2
Copyright © 2004
Insider Threat
Mission-critical information = High-value target
Threatens US Intelligence Community (IC), other Government
organizations and large corporations
Probability is low, but impact is severe
Types of Threat posed by malicious insiders
• Denial of service
• Compromise of confidentiality
• Compromise of integrity
High complexity of problem
• Increase in sharing of information, knowledge
• Increased availability of corporate knowledge online
• “Low and Slow” nature of malicious insiders
www.syrres.com
3
Copyright © 2004
Brian Patrick Regan: (1999-2001)
•Compromise: Removed and hid over 800 pages of classified material, email contact to
leaders in Iraq, Libya, and China
•Impact:
•Suspected acquisition of classified imagery and reports to Iraq
•Cyber Activities:
•Frequent need-to-know “violations”
•High volume printing; Encrypted emails
Robert Hanson: (1985-2001)
•Compromise: Exfiltrated over 6000 pages of classified material
•Impact:
•Divulged Intel capabilities of FBI and other agencies
•Identified three Soviet double agents (1 imprisoned, 2 killed)
•Cyber Activities:
•Frequent need-to-know “violations”
•Frequent queries looking for signs of an investigation targeting him
Malicious Insider, examples
www.syrres.com
4
Copyright © 2004
Characteristics of Malicious Insider
Behavior (current, projected)
Technically competent to highly-skilled
Attempts to cover up, destroy evidence
Sophisticated search / query techniques
Abuses security clearance to gain access to information
(violates “need to know”)
Downloads data to new devices (e.g., USB thumb drive)
Encrypts data
Changes system logs to hide activity
Uses “stealthy” techniques to communicate with handlers (e.g.,
encrypted email)
www.syrres.com
5
Copyright © 2004
Approach
Staged: Detect anomalies in user behavior from cyber
observables and, based on these anomalies, assess the risk of
malicious insider behavior
Multi-Perspective: Detect anomalies in user behavior
considering user-to-user, user-to-content, user-to-resource
relationships
Multi-Disciplinary:
• Social Network Analysis (SNA) - Apply concepts from SNA to detect
anomalies in social behavior [user-to-user]
• Semantic Analysis (SA)- Leverage Natural Language Processing (NLP)
and machine learning techniques to analyze the textual data associated with
insiders at a semantic (conceptual) level [user-to-content]
• Composite, Role-based Monitoring (CRBM) – Analyze insider activity
based on the organizational, application and operating system roles. [user-
to-resource]
www.syrres.com
6
Copyright © 2004
Research Objectives
Advance the state-of-art in Insider Threat Countermeasures by
developing techniques to:
• Model behavior of insiders operating in an IC-based context
• Distinguish between expected and anomalous user behavior
• Detect indicators of malicious insider behavior (MIB)
• Assess indicators of MIB for potential threat to the confidentiality and integrity
of information.
To reduce the overall effort in countering threat from malicious
insiders:
• Reduce the size of the problem space to a manageable number of indicators a
system security / assurance administrator would need to look at
• Provide early awareness of risk elevating situations
www.syrres.com
7
Copyright © 2004
Research Objectives, cont’d
Has Breadth Incorporates a wide range of observable types and can assess
multiple types of risk
Has depth Can analyze observables at fine-grained levels (e.g., semantics)
Is scalable Can model behavior at multiple levels (e.g., insider, role) and is
minimally impacted as # of insiders increases
Is extensible Can be extended to incorporate new threat scenarios and other
sources of indicators (e.g., anomaly detectors)
Is reusable Modules could be reused in another system or context
To provide a robust solution which:
www.syrres.com
8
Copyright © 2004
Assumptions
Insiders with similar roles, goals and tasks will have
similar behavior.
Malicious insider behavior will differ, to a measurable
degree, from behavior of typical insiders.
Insiders’ actual behavior will be discernable through
cyber-observations from sensors which currently exist
or could be constructed.
Anomaly-based or signature-based methods, by
themselves, are insufficient for identification of Insider
Threats.
www.syrres.com
9
Copyright © 2004
Approach/Methodology
Expected Behavior Model
communicate -
Analyst
search -
information
container
consume -
information
instance
Analyst
send information
instance -
Analyst
Insider
receive collaboration
request - Analyst
communicate -
Analyst
search -
information
container
consume -
information
instance
Linguist
send information
instance -
Analyst
receive collaboration
request - Analyst
communicate -
Analyst
search -
information
container
consume -
information
instance
Subject
Matter
Expert
send information
instance -
Analyst
receive collaboration
request - Analyst
•Hierarchically organized
by role/goal/task (RGT)
•Allows for computation
of non-deterministic
behavior (e.g.,
multitasking)
•Provides scoping
mechanism
•Can be used for both
pattern matching and
data generation
Analyze
Collect
communicate -
SME
receive collection
request - CRM
launch -
search
application
launch -
search application
launch –
analysis
application
search -
information
container
communicate -
collection
manager
consume -
information
instance
communicate -
senior reporter
communicate -
senior reporter
effect - $doc:
information
instance
search -
information
container
communicate -
SME
communicate -
linguist
Report
Analyst
communicate -
senior reporter
communicate -
senior reporter
communicate -
senior reporter
Collect
Analyze
Question
communicate -
SME
communicate -
CRM
send
collaboration
request - SME
receive collection
request - CRM
launch -
search
application
search -
information
container
search -
information
container
communicate -
collection
manager
request
collection -
collection
manager
communicate -
collection manager
consume -
information
instance
consume -
information
instance
Review
Available
Data
Request
Collection
www.syrres.com
10
Copyright © 2004
Approach/Methodology:
Risk Assessment
Observables
Anomalies
Indicators
Risk
“collector” behavior pattern
Confidentiality compromise (High)
atypical access to system
high-degree of off-topic consumption
low-degree of expected interaction
Risk is identified as indicators are asserted; indicators
are asserted from the anomalies detected
www.syrres.com
11
Copyright © 2004
System Overview
Expected
Behavior
Model
Observable
Activity Risks & Alerts
Risk
Assessor
Social
Network
Analysis
Semantic
Analysis
Composite
Role-Based
Analysis
Anomaly Detectors
black boxed sensor
input such as:
•web logs
•print logs
•email monitors
•phone logs
•system access logs
•Host sensor logs
•card key readers
•etc.
www.syrres.com
12
Copyright © 2004
Current Work: Relational Matrix Analysis Tool
(user-to-user, user-to-resource)
 Generate
Relational
Matrices
• Based on insider
(constrained by
RGT) versus a
hierarchy of
resources, goals, and
interaction methods
• Comparison level:
specific (explicit
resource) or generic
(resource type)
 Perform Outlier
Analysis
Relational
Matrix Analysis
Tool
Insider
Restrictions:
role, TOI,
AOI, task
Resource
Restrictions:
TOI, AOI,
task
Method
Restrictions
Insider vs. Resource
Matrix
Outlier Indicators
and Analysis
Observables (from Scenario)
<Observable>
<Name>Terry</Name>
<Role>analyst</Role>
<Toi>Biological Weapons</Toi>
<Aoi>Russia</Aoi>
<Task>Report</Task>
<Method>leave VM</Method>
<ResourceLabel>Smith</ResourceLabel>
<ResourceType>senior
reporter</ResourceType>
<Time>1071032734</Time>
</Observable>
Given:
 Observables
 Method
Restrictions
 Insider
Restrictions
 Resource
Restrictions
www.syrres.com
13
Copyright © 2004
Current Work: Semantic Analyses
(user-to-content)
Document clustering, based on geographic area-of-interest
www.syrres.com
14
Copyright © 2004
Current Work: Semantic Analyses
(user-to-content)
Document clustering, based on topic-of-interest
www.syrres.com
15
Copyright © 2004
System Architecture
Observable
Archive
Expected
Behavior
Model
Risk Assessor
XML interface
COTS R&D Leverage ARDA
Risk
Policy
Scenario
Generator
CPN Tools
IC Workflow
Model
Social Network
Monitor
JUNG
Semantic Analysis
Monitor
CNLP Technology
Composite Role-based
Monitor
Risk Assessment
Display
i2 Analyst Notebook
MS Excel
Controller / Rule Engine
JESS
Document
Collection
Document
Collection
Role-based Research
www.syrres.com
16
Copyright © 2004
Scalability of Solution
High Scalability / Extensibility
• Other anomaly detectors can be added to provide additional
indicators
• Risk Assessment Policy provides a means for writing new rules and
sets of rules
Generalizability
• Methodology provides abstraction mechanisms for managing
complexity
• Approach can be generalized to other domains
Reusability / Interoperability
• Anomaly detectors can provide indicators to other types of systems
• XML-based interfaces – provide “loose” couplings between
modules
www.syrres.com
17
Copyright © 2004
Limitations/Vulnerabilities
Non-cyber activities
• Mitigation: Security Administrator Application for entering / managing non-cyber
indicators
Undetected cyber observables:
• Most non-textual media (Images, Audio, Video)
» Example: Communications analyst inappropriately retrieving images
unrelated to task
» Mitigation: Analyze image meta-data to provide basic analysis of
image content
• Anonymous user behavior – Guest, and other potentially anonymous
activities such as access through web-based applications
» Mitigation: Can still monitor to identify risk
• Account “masquerading”
» Mitigation: Focus on individual insiders; detect shifts in behavior
www.syrres.com
18
Copyright © 2004
Summary
Currently under experimentation using controlled simulation with
synthetic data sets (scenarios):
• Baseline scenario – observables under normal conditions
• “Threat” scenarios – baseline scenario with anomaly injection
• Includes supporting UNCLASSIFIED document collections on a
variety of topics (e.g., Terrorism/WMD)
Preliminary results indicate
• Role-Goal-Task-orientation of Expected Behavior Model provides
a basis for modeling context-dependent behavior
• Relational Matrix approach very well suited to anomaly detection
in entity-to-entity interaction
• Semantic Analysis approach works well to identify off-topic
information access
www.syrres.com
19
Copyright © 2004
Acknowledgements
Advanced Research and Development Activity (ARDA)
Advanced Countermeasures for Insider Threat (ACIT) Program
(sponsor)
Other ARDA Programs
• Cyber Indications & Warning (CIW) Workshop (MITRE, Aug 03)
• Advanced Question & Answering for Intelligence (AQUAINT)
• Novel Intelligence from Massive Data (NIMD)
Mitigating the Insider Threat to Information Systems - #2;
Workshop Proceedings (RAND, Aug 00)

More Related Content

PDF
Automatic Insider Threat Detection in E-mail System using N-gram Technique
PDF
Anomaly Threat Detection System using User and Role-Based Profile Assessment
PDF
System Dynamics Based Insider Threats Modeling
PDF
Insider Threat Detection Recommendations
PPTX
insider threat research
PPTX
Insider Threats Detection in Cloud using UEBA
PPT
ch20uejdudyujdhjeo8jshbrujsjuukpsnnue.ppt
PDF
IQ4 Final Presentation (1)
Automatic Insider Threat Detection in E-mail System using N-gram Technique
Anomaly Threat Detection System using User and Role-Based Profile Assessment
System Dynamics Based Insider Threats Modeling
Insider Threat Detection Recommendations
insider threat research
Insider Threats Detection in Cloud using UEBA
ch20uejdudyujdhjeo8jshbrujsjuukpsnnue.ppt
IQ4 Final Presentation (1)

Similar to Machine Introduce for Beginner 5000-1222.ppt (20)

PPTX
Assessing Quality in Cyber Risk Forecasting
PDF
SplunkLive! Stockholm 2015 breakout - Analytics based security
PDF
SplunkLive! Amsterdam 2015 - Analytics based security breakout
PDF
CNIT 50: 9. NSM Operations
DOCX
Presented at the University of Louisville Cyber Securitys Day,.docx
PDF
Ch11 NetSec5e_Intruders and intruderssss
PPT
Accidental Insider
PPTX
IBM QRadar UBA
PDF
[Bucharest] Attack is easy, let's talk defence
PDF
SplunkLive Wellington 2015 - Splunk for Security
PDF
SplunkLive Auckland 2015 - Splunk for Security
PDF
Splunk for Security
PPTX
The Insider Threat January.pptx
PPT
Chapter No 20- Network and Security-by-MIT.ppt
PDF
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
PPTX
3.IS@Mohsin.pptx,.,,........,.............
PPTX
Insider threat v3
PPT
Firewalls in cryptography
PPTX
ASIS NYC InT Presentation
Assessing Quality in Cyber Risk Forecasting
SplunkLive! Stockholm 2015 breakout - Analytics based security
SplunkLive! Amsterdam 2015 - Analytics based security breakout
CNIT 50: 9. NSM Operations
Presented at the University of Louisville Cyber Securitys Day,.docx
Ch11 NetSec5e_Intruders and intruderssss
Accidental Insider
IBM QRadar UBA
[Bucharest] Attack is easy, let's talk defence
SplunkLive Wellington 2015 - Splunk for Security
SplunkLive Auckland 2015 - Splunk for Security
Splunk for Security
The Insider Threat January.pptx
Chapter No 20- Network and Security-by-MIT.ppt
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
3.IS@Mohsin.pptx,.,,........,.............
Insider threat v3
Firewalls in cryptography
ASIS NYC InT Presentation
Ad

Recently uploaded (20)

PDF
Categorization of Factors Affecting Classification Algorithms Selection
PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
UNIT 4 Total Quality Management .pptx
PPT
introduction to datamining and warehousing
PPTX
Current and future trends in Computer Vision.pptx
PDF
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PPT
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
PPTX
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
PPTX
Artificial Intelligence
PPTX
Safety Seminar civil to be ensured for safe working.
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPT
Project quality management in manufacturing
PPTX
Fundamentals of Mechanical Engineering.pptx
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
Categorization of Factors Affecting Classification Algorithms Selection
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
UNIT 4 Total Quality Management .pptx
introduction to datamining and warehousing
Current and future trends in Computer Vision.pptx
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
Artificial Intelligence
Safety Seminar civil to be ensured for safe working.
Automation-in-Manufacturing-Chapter-Introduction.pdf
Project quality management in manufacturing
Fundamentals of Mechanical Engineering.pptx
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
Ad

Machine Introduce for Beginner 5000-1222.ppt

  • 1. www.syrres.com Copyright © 2004 A Multi-Disciplinary Approach for A Multi-Disciplinary Approach for Countering Insider Threats Countering Insider Threats Secure Knowledge Management (SKM 2004) September 23-24, 2004 Marriott Buffalo-Niagara Amherst, NY USA Robert DelZoppo, Eric Brown, Matt Downey: Syracuse Research Corporation Michael D’Eredita, Elizabeth D. Liddy, Joon S. Park, Anand Natarajan, Svetlana Symonenko, Shuyuan M. Ho : Syracuse University
  • 2. www.syrres.com 2 Copyright © 2004 Insider Threat Mission-critical information = High-value target Threatens US Intelligence Community (IC), other Government organizations and large corporations Probability is low, but impact is severe Types of Threat posed by malicious insiders • Denial of service • Compromise of confidentiality • Compromise of integrity High complexity of problem • Increase in sharing of information, knowledge • Increased availability of corporate knowledge online • “Low and Slow” nature of malicious insiders
  • 3. www.syrres.com 3 Copyright © 2004 Brian Patrick Regan: (1999-2001) •Compromise: Removed and hid over 800 pages of classified material, email contact to leaders in Iraq, Libya, and China •Impact: •Suspected acquisition of classified imagery and reports to Iraq •Cyber Activities: •Frequent need-to-know “violations” •High volume printing; Encrypted emails Robert Hanson: (1985-2001) •Compromise: Exfiltrated over 6000 pages of classified material •Impact: •Divulged Intel capabilities of FBI and other agencies •Identified three Soviet double agents (1 imprisoned, 2 killed) •Cyber Activities: •Frequent need-to-know “violations” •Frequent queries looking for signs of an investigation targeting him Malicious Insider, examples
  • 4. www.syrres.com 4 Copyright © 2004 Characteristics of Malicious Insider Behavior (current, projected) Technically competent to highly-skilled Attempts to cover up, destroy evidence Sophisticated search / query techniques Abuses security clearance to gain access to information (violates “need to know”) Downloads data to new devices (e.g., USB thumb drive) Encrypts data Changes system logs to hide activity Uses “stealthy” techniques to communicate with handlers (e.g., encrypted email)
  • 5. www.syrres.com 5 Copyright © 2004 Approach Staged: Detect anomalies in user behavior from cyber observables and, based on these anomalies, assess the risk of malicious insider behavior Multi-Perspective: Detect anomalies in user behavior considering user-to-user, user-to-content, user-to-resource relationships Multi-Disciplinary: • Social Network Analysis (SNA) - Apply concepts from SNA to detect anomalies in social behavior [user-to-user] • Semantic Analysis (SA)- Leverage Natural Language Processing (NLP) and machine learning techniques to analyze the textual data associated with insiders at a semantic (conceptual) level [user-to-content] • Composite, Role-based Monitoring (CRBM) – Analyze insider activity based on the organizational, application and operating system roles. [user- to-resource]
  • 6. www.syrres.com 6 Copyright © 2004 Research Objectives Advance the state-of-art in Insider Threat Countermeasures by developing techniques to: • Model behavior of insiders operating in an IC-based context • Distinguish between expected and anomalous user behavior • Detect indicators of malicious insider behavior (MIB) • Assess indicators of MIB for potential threat to the confidentiality and integrity of information. To reduce the overall effort in countering threat from malicious insiders: • Reduce the size of the problem space to a manageable number of indicators a system security / assurance administrator would need to look at • Provide early awareness of risk elevating situations
  • 7. www.syrres.com 7 Copyright © 2004 Research Objectives, cont’d Has Breadth Incorporates a wide range of observable types and can assess multiple types of risk Has depth Can analyze observables at fine-grained levels (e.g., semantics) Is scalable Can model behavior at multiple levels (e.g., insider, role) and is minimally impacted as # of insiders increases Is extensible Can be extended to incorporate new threat scenarios and other sources of indicators (e.g., anomaly detectors) Is reusable Modules could be reused in another system or context To provide a robust solution which:
  • 8. www.syrres.com 8 Copyright © 2004 Assumptions Insiders with similar roles, goals and tasks will have similar behavior. Malicious insider behavior will differ, to a measurable degree, from behavior of typical insiders. Insiders’ actual behavior will be discernable through cyber-observations from sensors which currently exist or could be constructed. Anomaly-based or signature-based methods, by themselves, are insufficient for identification of Insider Threats.
  • 9. www.syrres.com 9 Copyright © 2004 Approach/Methodology Expected Behavior Model communicate - Analyst search - information container consume - information instance Analyst send information instance - Analyst Insider receive collaboration request - Analyst communicate - Analyst search - information container consume - information instance Linguist send information instance - Analyst receive collaboration request - Analyst communicate - Analyst search - information container consume - information instance Subject Matter Expert send information instance - Analyst receive collaboration request - Analyst •Hierarchically organized by role/goal/task (RGT) •Allows for computation of non-deterministic behavior (e.g., multitasking) •Provides scoping mechanism •Can be used for both pattern matching and data generation Analyze Collect communicate - SME receive collection request - CRM launch - search application launch - search application launch – analysis application search - information container communicate - collection manager consume - information instance communicate - senior reporter communicate - senior reporter effect - $doc: information instance search - information container communicate - SME communicate - linguist Report Analyst communicate - senior reporter communicate - senior reporter communicate - senior reporter Collect Analyze Question communicate - SME communicate - CRM send collaboration request - SME receive collection request - CRM launch - search application search - information container search - information container communicate - collection manager request collection - collection manager communicate - collection manager consume - information instance consume - information instance Review Available Data Request Collection
  • 10. www.syrres.com 10 Copyright © 2004 Approach/Methodology: Risk Assessment Observables Anomalies Indicators Risk “collector” behavior pattern Confidentiality compromise (High) atypical access to system high-degree of off-topic consumption low-degree of expected interaction Risk is identified as indicators are asserted; indicators are asserted from the anomalies detected
  • 11. www.syrres.com 11 Copyright © 2004 System Overview Expected Behavior Model Observable Activity Risks & Alerts Risk Assessor Social Network Analysis Semantic Analysis Composite Role-Based Analysis Anomaly Detectors black boxed sensor input such as: •web logs •print logs •email monitors •phone logs •system access logs •Host sensor logs •card key readers •etc.
  • 12. www.syrres.com 12 Copyright © 2004 Current Work: Relational Matrix Analysis Tool (user-to-user, user-to-resource)  Generate Relational Matrices • Based on insider (constrained by RGT) versus a hierarchy of resources, goals, and interaction methods • Comparison level: specific (explicit resource) or generic (resource type)  Perform Outlier Analysis Relational Matrix Analysis Tool Insider Restrictions: role, TOI, AOI, task Resource Restrictions: TOI, AOI, task Method Restrictions Insider vs. Resource Matrix Outlier Indicators and Analysis Observables (from Scenario) <Observable> <Name>Terry</Name> <Role>analyst</Role> <Toi>Biological Weapons</Toi> <Aoi>Russia</Aoi> <Task>Report</Task> <Method>leave VM</Method> <ResourceLabel>Smith</ResourceLabel> <ResourceType>senior reporter</ResourceType> <Time>1071032734</Time> </Observable> Given:  Observables  Method Restrictions  Insider Restrictions  Resource Restrictions
  • 13. www.syrres.com 13 Copyright © 2004 Current Work: Semantic Analyses (user-to-content) Document clustering, based on geographic area-of-interest
  • 14. www.syrres.com 14 Copyright © 2004 Current Work: Semantic Analyses (user-to-content) Document clustering, based on topic-of-interest
  • 15. www.syrres.com 15 Copyright © 2004 System Architecture Observable Archive Expected Behavior Model Risk Assessor XML interface COTS R&D Leverage ARDA Risk Policy Scenario Generator CPN Tools IC Workflow Model Social Network Monitor JUNG Semantic Analysis Monitor CNLP Technology Composite Role-based Monitor Risk Assessment Display i2 Analyst Notebook MS Excel Controller / Rule Engine JESS Document Collection Document Collection Role-based Research
  • 16. www.syrres.com 16 Copyright © 2004 Scalability of Solution High Scalability / Extensibility • Other anomaly detectors can be added to provide additional indicators • Risk Assessment Policy provides a means for writing new rules and sets of rules Generalizability • Methodology provides abstraction mechanisms for managing complexity • Approach can be generalized to other domains Reusability / Interoperability • Anomaly detectors can provide indicators to other types of systems • XML-based interfaces – provide “loose” couplings between modules
  • 17. www.syrres.com 17 Copyright © 2004 Limitations/Vulnerabilities Non-cyber activities • Mitigation: Security Administrator Application for entering / managing non-cyber indicators Undetected cyber observables: • Most non-textual media (Images, Audio, Video) » Example: Communications analyst inappropriately retrieving images unrelated to task » Mitigation: Analyze image meta-data to provide basic analysis of image content • Anonymous user behavior – Guest, and other potentially anonymous activities such as access through web-based applications » Mitigation: Can still monitor to identify risk • Account “masquerading” » Mitigation: Focus on individual insiders; detect shifts in behavior
  • 18. www.syrres.com 18 Copyright © 2004 Summary Currently under experimentation using controlled simulation with synthetic data sets (scenarios): • Baseline scenario – observables under normal conditions • “Threat” scenarios – baseline scenario with anomaly injection • Includes supporting UNCLASSIFIED document collections on a variety of topics (e.g., Terrorism/WMD) Preliminary results indicate • Role-Goal-Task-orientation of Expected Behavior Model provides a basis for modeling context-dependent behavior • Relational Matrix approach very well suited to anomaly detection in entity-to-entity interaction • Semantic Analysis approach works well to identify off-topic information access
  • 19. www.syrres.com 19 Copyright © 2004 Acknowledgements Advanced Research and Development Activity (ARDA) Advanced Countermeasures for Insider Threat (ACIT) Program (sponsor) Other ARDA Programs • Cyber Indications & Warning (CIW) Workshop (MITRE, Aug 03) • Advanced Question & Answering for Intelligence (AQUAINT) • Novel Intelligence from Massive Data (NIMD) Mitigating the Insider Threat to Information Systems - #2; Workshop Proceedings (RAND, Aug 00)