Online Monitoring and Prevention of Internal Security Threats in Academic Campuses
Online Monitoring and Prevention of Internal Security Threats in Academic Campuses
Web Site: www.ijaiem.org Email: [email protected], [email protected] Volume 2, Issue 11, November 2013 ISSN 2319 - 4847
ABSTRACT
It has always been challenging to keep watch on a watchman. In most of the institutions responsibility of protecting student, faculty and research data is entrusted to handful of trusted technocrats. As they are trusted persons, they are usually not monitored. There are several studies, which show that in majority of Information Security breaches, insiders were involved. Academic institutions have important student information and sensitive information about ongoing and finished research projects. As per various laws and acts, it is mandatory to protect student information and Intellectual Property. Generally University campuses are less disciplined compared to a business organization, which makes it more difficult. Further, fast moving student population and budget constraint also make the job further difficult. Most of the tools provide information about suspicious host but are unable to identify the exact user. Proposed architecture addresses this issue by capturing user actions and associated applications. In order to track and monitor user activities, they are correlated with active directory context. The proposed architecture enables implementation without disrupting the Campus Network and doesnt degrade the network performance. Further, it allows real-time monitoring and communication of alerts to concerned persons.
1. INTRODUCTION
An Insider Threat is a malicious threat to an organization that comes from people within the organization, such as employees, former employees, contractors or business associates, who have inside information concerning the organization's security practices, data and computer systems. The threat may involve fraud, the theft of confidential or commercially valuable information, the theft of intellectual property, or the sabotage of computer systems [Wikipedia]. A report published in July 2012 on the insider threat in the U.S. financial sector gives some statistics on insider threat incidents: 80% of the malicious acts were committed at work during working hours; 81% of the perpetrators planned their actions beforehand; 33% of the perpetrators were described as "difficult" and 17% as being "disgruntled. The insider was identified in 74% of cases. Financial gain was a motive in 81% of cases, revenge in 23% of cases, and 27% of the people carrying out malicious acts were in financial difficulties at the time [1]. The US Department of Defense Personnel Security Research Center published a report that describes approaches for detecting insider threats [2]. Earlier it published ten case studies of insider attacks by information technology professionals [3]. The Project on Government Oversight (POGO), a watchdog group, released a memo from the Department of Energy's National Nuclear Security Administration (NNSA) expressing concern over the theft of three computer hard discs by an employee at Los Alamos National Security LLC (LANS) in January. As per the third annual Higher Education IT Security Survey 2008, by CDW-G [4] states that, the amount of data residing on the network is growing exponentially and IT directors struggle to balance security concerns with the open nature of higher education. The report concludes that less than half of campus networks are secure and data theft of sensitive information has increased up to 43%. Today, institutions find that their research data, intellectual property and sensitive information can be found on virtually any computer system or network in the campus. Academic records, patent research, financial information, transactions, student information, and many other types of protected information can routinely be found in databases, files and file servers, document management systems, e-mails etc. The challenge for Information Security Officers is how to determine what user action is legitimate and what is not. Once a legitimate user has access to internal resources, it may be hard to identify actions that are malicious. This can be particularly difficult when the user is an external consultant who has been granted limited access to carry out some institutional task. The different types of information assets such as documents, spreadsheets, images and databases, that organizations generate is growing exponentially. Typical campus networks include a mix of servers, switches, routers and wireless access points from multiple vendors, and connect users to numerous applications. Most of these servers and applications are protected by access control and logging mechanisms that are often specific to the platform. In addition to this, high employee turnover and changing roles are further enhancing the overall complexity. The rest of this paper is organized as follows. In section 2, related works are shown. In section 3, present solution and their shortcomings are discussed. Section 4, describes proposed solution and its implementation plan. Finally, in section 5, conclusion along with future work is presented.
Page 28
Page 29
4. PROPOSED SOLUTION
In order to discharge their duties efficiently, concerned employees must be trusted to certain extent. But this trust should follow the policy of trust but verify. We know that if anything can go wrong, sooner or later it will go wrong. Trust is necessary, but it must be monitored. Institutions are expected to keep track of the following: who is accessing sensitive information, when and how is it accessed; how is this information flowing within the institution?; what are authorized users and consultants actually doing?; what is the extent of a security breach or policy violation?; how much are resources being consumed across users, systems and applications?; are access controls being implemented and monitored as per the policy? etc. 4.1 Inputs required for effectively managing insider threats We need the following information for effective threat management: details of the assets being accessed e.g. filename, filepath, DB name, DB table name, type of operation, email addresses, attachments, chat identities, and webmail information. The path of access: was it done from inside the company or using VPN? The pattern of access: Number of records deleted, copied, updated. Tracking sensitive data movement across the Campus Network. Were they just copied form one server to the other? Using the applications native login and access controls? What is needed is detailed user transaction information in an actionable format [17]. Given these challenges and the growing complexity of securing servers, applications, and data, a new approach is needed to identify breaches and inappropriate activity, not after the fact by analyzing logs and audit trails, but in real-time when the violation can be stopped. Proposed solution captures extremely detailed network user actions across applications and correlates it with directory context to track and enforce institutional policies across the campus network. This is very different form existing approaches that essentially provide a traffic oriented view of user activity. Industry experts expect 90 percent of all businesses to be using Active Directory by 2010 [7]. In view of the above, efforts are made to propose a solution which can be implemented by the academic institutions, having low budget and limited manpower in minimum possible time. Further, the solution should not only detect the violation but identify the person and prevent the action on real time basis or generate an alert. While achieving this, care is taken that network performance should remain unaffected. 4.2 Architecture of proposed solution Figure 1, describes architecture of the proposed solution, Online Monitoring and Prevention of Internal Security Threats in Academic Campuses. There are two key modules: Grabber and Rea-Time Monitor. These are supported by three additional modules: Intelligent Rule Builder, History Analyzer and Auditor. Grabber module sits generally in or near a server farm, looking at the traffic that is flowing in and out of that server farm. It decodes all the protocol and application information after capturing and filtering unwanted data keeping in view the requirements of the Information Security Manager. Existing directory systems having legacy standards can also be used as it is, by deploying optional metadirectories. Computing power required to do this in real time is available at reasonable cost. The preferred mode of installation is to attach it to the switch on a SPAN port, so network performance remains unaffected. Though, using taps is more efficient but in order to reduce the cost SPAN ports are preferred. Secondly, they can be managed and allows selective monitoring of desired ports. Real-Time Monitor module analyzes the captured transactions to provide intelligence and mitigate insider threats. The module analyzes and reports the exceptions, as well as automates operational and security audits. It provides real-time, highly detailed activity tracking, alerting, and policy enforcement; all while maintaining historical records for instant analysis. This is all accomplished without agents or network changes.
Page 30
Figure 1: Architecture of the Trusted Insider Tracking and Alerting System Post-Mortem module comprises two sub modules: Auditor module and History analyzer. Audit module automates audit process using history database and rule engine and generates routine as well as exception reports. History Analyzer builds user profiles and tries to match with profiles of other users performing similar duties. In addition, it looks for patterns and communicates to concerned person for further probe. It also provides Google like search environment for quick retrieval of the desired information. The Intelligent Rule Builder, interacts with almost all the objects and identifies actionable rules, once the violation pattern is established and action is approved by the authorities. By correlating user activity with a directory system, the following can be tracked: Network activity, including privileged and rogue users and systems Use of approved and unapproved applications and the means of access Access and movement of directories, files tables and records Broad e-mail and messaging transactions including instant messaging All cross-organization user and heterogeneous application activity is seen and recorded, including that of legacy systems and undocumented users. Information about user access to IP is presented by an alert mechanism. 4.3 Implementation plan for the solution described above to protect IP and sensitive student information Solution proposed in the section 4.2, can be implemented as under: 4.3.1 Identify key intellectual property assets and sensitive data. Identify key IP assets and sensitive data, which need protection. Generate asset wise and user wise report giving detailed user-object relationship. 4.3.2. Actively monitor. Examine and generate asset wise report. For example, when the information on server storing data of bio-technology research group was accessed without encryption turned on. If this is a violation of policy, such a report is of enormous value to the institution. Generate reports that look for anomalies in access to those assets. Generate use wise reports: Look at how particular users access all the sensitive assets and look for suspicious patterns. Compare the patterns of access between users in a department or who are working on the same project. In addition to running reports, the user can perform ad hoc queries based on various parameters. This query provides user actions over any period of time. It allows the Information Security Officer to focus on user activity that is suspicious. When normal behavior has been established, the system can be configured to generate alerts when accesses to IP appear to be suspicious. Conditions that are suspicious can be created based on historical information and, when these conditions occur, alerts are generated. The Grabber captures network traffic and combines it with the Active Directory information, creating "user-action records." Rules can be applied to the user-action records and when a rule is being violated, an alert is generated. It also sends an alert to the concerned person through SMS or E-mail to the address stored in the active directory. For example, an academic section employee whose job is to verify mark sheets or degrees, based on requests received from the employers for the candidates short listed by them. It would be unusual, however, for this employee to print
Page 31
5. CONCLUSION
The proposed solution is quick to deploy and allows organizations to get immediate results. There are no changes required to an existing network, identity or directory services. The solution provides real-time activity tracking, alerting, and policy enforcement and audit automation while the system manages historical records retained online for immediate access. It gives full visibility into group, user, system access, application use, and data access trends. It tracks user activities at the application level in heterogeneous environments, including legacy systems, in real time. The Proposed solution ensures secured academic campuses by protecting their critical information, intellection property and sensitive data, all while opening up access to research collaborations, outsourcing partners and contract employees. By leveraging Active Directory and providing alerts and reports, administration is improved. It also facilitates policy implementation and audit automation. Future plans involve, assessment of the proposed architecture and improving the Intelligent Rule Builder by considering behavioral aspects also.
References
[1.] Cummings, Adam; Lewellen, Todd; McIntire, David; Moore, Andrew; Trzeciak, Randall (2012), Insider Threat Study: Illicit Cyber Activity Involving Fraud in the U.S. Financial Services Sector, Software Engineering Institute, Carnegie Mellon University, (CMU/SEI-2012-SR-004) [2.] Shaw, Eric; Fischer, Lynn; Rose, Andre (2009), Insider Risk Evaluation and Audit, Department of Defense Personnel Security Research Center, TR 09-02 [3.] Shaw, Eric; Fischer, Lynn (2005), Ten Tales of Betrayal: The Threat to Corporate Infrastructures by Information Technology Insiders Analysis and Observations [4.] CDW-G third annual report on higher education IT Security, http://newsroom.cdwg.com/features/feature-10-2507.html, 2008 [5.] Data leakage study conducted by CISCO and InsightExpress, http://www.cisco.com/en/US/solutions/collateral/ns170/ns896/ns895/white_paper_c11-506224.html , 2008 [6.] John h. Buford, Lundy Lewis, Gabriel Jacobson. Insider threat detection using situation aware MAS. In the proceedings of 11th International Conference Information Fusion, page(s):1-8, Cologne, ISBN: 978-3-8007-30926, July 2008 [7.] Linda Musthaler , Network World , http://www.networkworld.com/newsletters/techexec/2006/0522techexec1.html, 2006 [8.] M. Sebring, E. Shellhouse, M. Hanna, and Whitehurst. Expert Systems in Intrusion Detection: A Case Study. In Proceedings of the Summer USENIX Conference, pp. 74-81, Baltimore, Maryland, 17-20 1988.
Page 32
AUTHOR
D.S. Bhilare received his M.Tech.(Computer Sc.), M.Phil.(Computer Sc.), Ph.D. (Computer Sc.), and MBA from Devi Ahilya University, Indore. Worked as a senior project leader for ten years in the industry and developed various business applications for different industries. Since last twenty four years, working in the University as a Senior Manager & Head IT Centre, involved in Computer Centre and Campus Network Management. His areas of interest are Information Security, Network Management and Project Management.
Page 33