files can signal suspicious behavior, such as the
concealment of malicious activity. State changes of
files with the attributes hidden or readonly, as well
as the creation of these files, can also be considered
suspicious depending on the context. The creation or
modification of alternate data streams can also signal
misuse.
The primary objective of the research is to
mitigate insider threats against sensitive information
stored in an organization’s computer system, using
dynamic forensic mechanisms to detect insiders’
malicious activities. Among various types of insider
threats, which may break confidentiality, integrity,
or availability, this research is focused on the
violations of confidentiality with privilege misuse or
escalation in sensitive applications. In particular, we
identify five generic threat-scenarios against
confidentiality. We then describe how to detect each
threat scenario by analyzing the insider’s activities
in terms of Copy, Rename, Print, and Paste. Finally,
we implement our detection mechanisms by
extending the capabilities of existing software
packages in Windows environments. Since our
approach can proactively detect insider threats
before the malicious action is finished, we can
prevent the damage proactively, while most of
existing approaches detect the malicious action after
the damage.
2 RELATED WORK
In this section we describe the related works that we
use to implement our proposed ideas. We could
develop a brand new system based on our approach,
but we decided to use existing packages with
extension by considering the cost-effectiveness,
reusability, compatibility, and extensibility. The
details about how we use these existing approaches
are described in the following sections.
2.1 Windows Registry
The Windows Registry (Honeycutt, 2002) is a
hierarchical database that stores system parameters,
security information, program configuration settings
and user profiles. The Windows operating system
and applications query the values of specific registry
keys, dictating system operations as well as user
environments. Registry keys and values are added to
the database when new hardware, applications,
users, and information are added to the system. The
Windows Registry was introduced in its current
form in Window 9x/ME, and has been used in all
derivations and iterations of Microsoft Windows
operating systems release since then, including the
most recent release, Windows Vista. There are five
root keys that cover different aspects of system
operation, including
HKEY_CLASSES_ROOT,
HKEY_CURRENT_USER, HKEY_LOCAL_MACHINE,
HKEY_USERS, HKEY_CURRENT_CONFIG
. These
components include the name of the system process
querying the registry, the type of query, the actual
registry key being accessed, the status of the query,
and the resultant value, if any.
2.2 Process Monitor
Microsoft Process Monitor (Windows Sysinternals,
2008) is a system-monitoring tool to show real-time
file system, Registry and process/thread activities for
Microsoft Windows operating systems with NT
Kernel 5.0 and above such as Windows 2000 (both
workstation and server), Windows XP (both 32 and
64 bit), Windows Server 2003 (both 32 and 64 bit)
and Windows Vista (both 32 and 64 bit). Process
Monitor consists of three monitoring modules; file
system, registry, and process/thread. File system
monitoring displays file system activities for all
Windows file system, including local storage and
remote file systems. It also automatically detects the
arrival of new file system devices and monitors
them. Registry monitoring logs all registry
operations and displays Registry path using
conventional abbreviations for Registry root keys.
The process monitoring tracks all process and thread
creation and exit operations as well as DLL and
device load operations. The software is currently
provided by Windows Sysinternals (Windows
Sysinternals, 2008), which was acquired by
Microsoft in 2006.
2.3 Windows Clipboard Systems
The Windows The Windows Clipboard (Windows
Clipboard, 2008) is a method or a set of functions
and that enable applications to transfer data within
the Windows environment. The Clipboard system is
often confused with the Windows Clipboard Viewer
(clipbrd.exe located in the
%SystemRoot%\System32\), which is just an
application included in Windows-NT architecture
operating systems (i.e. Windows 2000, Windows
XP, Windows Server 2003 and Windows Vista). The
clipboard viewer displays the current content of the
Clipboard system one at a time, which means it
displays only the most recent one. The viewer
supports only the standard formats; CF_BITMAP,
ICEIS 2009 - International Conference on Enterprise Information Systems
394