OS Independent and Hardware-Assisted Insider Threat Detection and Prevention Framework

2018 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2018)(2018)

引用 6|浏览36
暂无评分
摘要
Governmental and military institutions harbor critical infrastructure and highly confidential information. Although institutions are investing a lot for protecting their data and assets from possible outsider attacks, insiders are still a distrustful source for information leakage. As malicious software injection is one among many attacks, turning innocent employees into malicious attackers through social attacks is the most impactful one. Malicious insiders or uneducated employees are dangerous for organizations that they are already behind the perimeter protections that guard the digital assets; actually, they are trojans on their own. For an insider, the easiest possible way for creating a hole in security is using the popular and ubiquitous Universal Serial Bus (USB) devices due to its versatile and easy to use plug-and-play nature. USB type storage devices are the biggest threats for contaminating mission critical infrastructure with viruses, malware, and trojans. USB human interface devices are also dangerous as they may connect to a host with destructive hidden functionalities. In this paper, we propose a novel hardware-assisted insider threat detection and prevention framework for the USB case. Our novel framework is also OS independent. We implemented a proof-of-concept design on an FPGA board which is widely used in military settings supporting critical missions, and demonstrated the results considering different experiments. Based on the results of these experiments, we show that our framework can identify rapid-keyboard key-stroke attacks and can easily detect the functionality of the USB device plugged in. We present the resource consumption of our framework on the FPGA for its utilization on a host controller device. We show that the our hard-to-tamper framework introduces no overhead in USB communication in terms of user experience.
更多
查看译文
关键词
prevention framework,military institutions,information leakage,malicious software injection,malicious attackers,USB type storage devices,mission critical infrastructure,USB human interface devices,rapid-keyboard key-stroke attacks,host controller device,hard-to-tamper framework,USB communication,OS independent threat detection,governmental institutions,universal serial bus devices,plug-and-play nature,proof-of-concept design,FPGA board,hardware-assisted insider threat detection
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要