Detecting insider activity using enhanced directory virtualization

  • Authors:
  • William R. Claycomb;Dongwan Shin

  • Affiliations:
  • Sandia National Laboratories, Albuquerque, NM, USA;New Mexico Tech, Socorro, NM, USA

  • Venue:
  • Proceedings of the 2010 ACM workshop on Insider threats
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Insider threats often target authentication and access control systems, which are frequently based on directory services. Detecting these threats is challenging, because malicious users with the technical ability to modify these structures often have sufficient knowledge and expertise to conceal unauthorized activity. The use of directory virtualization to monitor various systems across an enterprise can be a valuable tool for detecting insider activity. The addition of a policy engine to directory virtualization services enhances monitoring capabilities by allowing greater flexibility in analyzing changes for malicious intent. The resulting architecture is a system-based approach, where the relationships and dependencies between data sources and directory services are used to detect an insider threat, rather than simply relying on point solutions. This paper presents such an architecture in detail, including a description of implementation results.