Proceedings From the Sixth Annual IEEE SMC Information Assurance Workshop 2005
DOI: 10.1109/iaw.2005.1495981
|View full text |Cite
|
Sign up to set email alerts
|

Molehunt: near-line semantic activity tracing

Abstract: Abstract-This paper discusses threats posed by low granularity in access to confidential (classified) data typically found at lower protection levels, namely direct access beyond need to know and the correlation of materials yielding more sensitive aggregate data by both insider threats and malware, an area of particular concern for intelligence analysis. It is argued that while active security controls at both the procedural and technical level are currently not pragmatically feasible, near-line semantic moni… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2005
2005
2007
2007

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 31 publications
0
4
0
Order By: Relevance
“…The storage can be allocated on any file system, but to retain the invisibility of the system to the user, this is best achieved by allocating one or more separate file systems to it and hiding it (at the level of the file system filter driver) from the remainder of the operating system, and hence from both observation and manipulation by users and application programs. For reasons of performance (since the mechanism makes use of the VM architecture), it is desirable to locate these shadowing volumes on local storage (see Wolthusen [1] for a discussion of performance benchmarks).…”
Section: File Shadowing Mechanismmentioning
confidence: 99%
See 2 more Smart Citations
“…The storage can be allocated on any file system, but to retain the invisibility of the system to the user, this is best achieved by allocating one or more separate file systems to it and hiding it (at the level of the file system filter driver) from the remainder of the operating system, and hence from both observation and manipulation by users and application programs. For reasons of performance (since the mechanism makes use of the VM architecture), it is desirable to locate these shadowing volumes on local storage (see Wolthusen [1] for a discussion of performance benchmarks).…”
Section: File Shadowing Mechanismmentioning
confidence: 99%
“…The mechanisms for interposition of an interception mechanism (with additional transparent in-line proxying for HTTPS (TLS) connections) have been described elsewhere [5,6]; by inserting kernel modules and driver components at several locations within the Windows NT network protocol stack, all inbound and outbound network traffic can be observed transparently without affecting application programs -for a discussion of the specific adaptations required for extracting sensor data refer to Wolthusen [1].…”
Section: Network Stack Instrumentationmentioning
confidence: 99%
See 1 more Smart Citation
“…Core elements of the implementation mechanisms used on the Microsoft Windows NT/XP platform have been described in earlier publications [24,23]. In addition to administrative functions for generating and maintaining capability lists (which are beyond the scope of this paper), the implementation mechanism consists of two extensions to the base OS.…”
Section: Implementation Aspectsmentioning
confidence: 99%