Search or add a thesis

Advanced Search (Beta)
Home > Behavior Driven Host Based Insider Threats Detection of Misuse of Information for Windows Environment.

Behavior Driven Host Based Insider Threats Detection of Misuse of Information for Windows Environment.

Thesis Info

Access Option

External Link

Author

Maaz Bin Ahmad

Program

PhD

Institute

University of Engineering and Technology

City

Taxila

Province

Punjab

Country

Pakistan

Thesis Completing Year

2015

Thesis Completion Status

Completed

Subject

Computer Science

Language

English

Link

http://prr.hec.gov.pk/jspui/bitstream/123456789/10034/1/Thesis_finalv.2.pdf

Added

2021-02-17 19:49:13

Modified

2024-03-24 20:25:49

ARI ID

1676727710587

Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.

Similar


With the evolution of information technology in the corporate sector, the working paradigm shifted from manual to automated. On one side, it has leveraged human efforts of managing and maintaining the document files efficiently while on the other hand, it demands more security efforts for confidential documents because of the availability of large number of access channels. So the horizon of information security has also expanded from physical to electronic. This laid the foundation of developing more security mechanisms for protecting valuable information. The need and use of internet inside the organizations made this security problem quite nontrivial. Organizations not only have to protect those documents from external (outside the organization) attackers but also have to do the same for insiders (their legitimate users). Time has proven that majority of the attacks to tamper the confidentiality of information of an organization comes from external attackers but most of the attacks that get successful are from insiders. This is due to an obvious fact that insiders already possess the information external attackers would need to find out to penetrate into a system. It has always been an intricate job to protect your critical assets from those who not only have your trust but are also privileged to access those assets. This also holds good for insiders who (normally) are the rightful users of confidential information in the organization. Their privileged access to secret resources, knowledge about critical information and security mechanisms implemented inside the organization and their ability to bypass the existing security arrangements make the insider threats detection problem quite a significant one. The criticality of the problem can be vindicated by the fact that even a little misuse of the confidential informational assets of the organization may bring the reputation of the organization down from first-rate standing to below-par and can adversely affect the its financial position. To cope up with the aforementioned challenges, a host based framework for insider threats detection of information misuse has been presented in this dissertation. This research work has broad applicability with reference to the organizations of Pakistan especially those which work on missioncritical projects and products like Khan Research Laboratories, National Development Complex, Atomic Energy Commission, National Engineering and Scientific Commission. Private sector organizations can also benefit if the confidentiality of their secret information is critically significant for them. This framework will enable these organizations to cope up with the security threats posed by the insiders even if they already use a third party tool for detection. Such organizations can get advantage from the framework in their efforts to avoid/reduce possible insider attacks. Tunable parameters of the framework make it flexible and organizations can use it according to their need and security requirements. The framework in its nature is a comprehensive one. It not only comprehends technical measures but also covers psychological indicators to handle the misuse of information by insiders. Compared with the available methodologies, it incorporates a more practical approach. It provides a novel methodology of risk assessment which practically quantifies the risks and assigns threats level to each user depending upon his/her behavior, a problem which has not been handled in detail in the current literature of insiders. It also denies the famous assumption of no covert channel’s presence in the mechanisms used for detection. It proves the aforementioned assumption as unrealistic and a great threat to the organization. It discusses a deployment methodology to avoid this assumption. In this deployment, the source code of the developed application is accessible only to the higher management of the organization in order to detect any illegal changes in the source files through different techniques like code reviews etc. Besides describing efficient behavioral classification mechanism through fuzzy classifier, development of information sensors to capture necessary information, reduction in overall processing overheads by deploying non uniform security policies and the way to minimize false alarms by filtering insiders in different stages, it also provides an exhaustive blue print of scenario building and testing methodology in order to validate the framework. This validation methodology is quite closer to the real world environment of the organizations by simulating the real attack scenarios on the framework instead of theoretically providing a validation methodology. In epitome, the framework provides sufficient contributions to the knowledge of the insider threats detection domain. We, here in Pakistan would have remained unaware of the latest research in the field of networks and information security had HEC (Higher Education Commission of Pakistan) not taken revolutionary steps like providing free access to many digital resources and libraries, facilitating students with laptops, providing research grants and scholarships. The vision of HEC has enabled researchers to reveal the positive value that their research can bring into this country. Its technical and financial support has been a beacon for individuals who want to pursue their research work in the area of their interest. It is also due to the support of HEC that we have been able to conduct this research. HEC facilitated us in all ways during the course of this research work. From providing the supervision of knowledgeable academic professionals to the facilitation of modern literature, tools, accommodation and arrangements, HEC’s role has been very sublime and encouraging.
Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

سپ تے فقیر

سپ تے فقیر

کسے پنڈ وچ اک فقیر رہندا سی۔ بہت غریب سی، اوہدا تے اوہدے گھر والی دا گزارہ خیرات والیاں چیزاں اتے ای ہوندا سی۔ اک دن اوہناں کول کھاون لئی کجھ وی نئیں سی۔ ایس لئی اوہ سویرے سویرے ای بھیک منگن ٹر پیا۔ فقیر کول اک کپڑے دا تھیلہ سی جس وچ اوس نے اک لوٹا تے اک کجہ رکھیا ہویا سی۔ کجے وچ وی اوہ لوکاں ولوں ملیا سالن پاندا تے لوٹے وچ پانی پا کے ضرورت ویلے پیندا سی۔ ہتھ وچ اوہ ہمیشہ سوٹی رکھدا سی۔ رستے وچ جاندے ہویاں اوس نوں اک سپ نظر آیا۔ اوس نے بہت تیزی نال سپ نوں کجے وچ بند کیتا۔ اوس دا منہ کپڑے نال بند کر کے اپنی بیوی نوں دے دتا۔ اوس نوں یقین سی کہ جدوں اوہدی بیوی کجہ کھولے گی تاں سپ اوس نوں ڈنگ مارے گا تے انج اوہ مر جاوے گی۔ جدوں اوس دی بیوی نے کجے دا منہ کھولیا تاں اوس نوں اندروں اک بہت قیمتی ہار ملیا۔ ایہہ ویکھ کے دونویں بہت حیران ہوئے۔

ایس خوبصورت ہار دی شہرت جدوں شہزادی تائیں اپڑی تاں اوس نے ہار ویکھن دی خواہش دا اظہار کیتا۔ ہار ویکھ کے شہزادی نے اوہناں نوں منہ منگے پیسے دے کے ہار خرید لیا۔ شہزادی ہار خرید کے بہت خوش سی۔ اک دن اوس ہار اپنے میز اتے رکھیا تے آپ کسے کم محل توں باہر چلے گئی۔ واپس آئی تاں اوس نوں حیرت ہوئی کہ میز اتے ہار نئیں بلکہ اک سوہنا جیہا بال منہ وچ انگوٹھا پا کے ستا ہویا اے۔ پہلاں تاں شہزادی بہت ڈری۔ وزیر نے آکھیا کہ تہاڈا ہار جادو دا ہار سی۔ دراصل اوہ ایہو بچہ سی جس نوں ظالم جادوگر نے ہار بنا دتا سی۔ ہن ایہہ دوبارہ اپنی...

بیوہ عورت کی کفالت سیرت طیبہ صلی اللہ علیہ وسلم کی روشنی میں

Holy Prophet (PBUH) has been made blessing for Humanity, and the being of Prophet (PBUH) is such an ocean of blessings that no any strata of society is derived of  by his teachings. Before the arrival of Holy Prophet (PBUH), the weak strata of society used to be oppressed in all its forms and manifestations, and suffered all sort of atrocity and cohesion. It is very core to the Teachings of Prophet (PBUH) that, it restored the rights of former oppressed class and brought its status equal to all. The list of oppressed and weak strata of society remained long, but our discussion is confined to the widow. Before Islam, the status of widow was very deplorable and she was ground under the oppression of all other strata of society. Even though in some religions, she was burnt alive with the corpse of husband. And somewhere her second marriage was denied and somewhere so on. But, a teaching of Islam and Holy Prophet (PBUH) has given a very crucial, respectable and safe as well as significant place to her in society. This article deals with this subject in detail, with solid references from different resources. In the end this articles carries suggestion for the welfare and development of widows.

Impact of Devolution on Managerial Functions of Public Health: Perception of Health Managers in Pakistan

The objective of the study was to examine the impact of devolution reform of 2001 on the health management functions and to determine the change in managerial roles and responsibilities after the devolution reform. Qualitative research methods, inclusive of review of published as well as the grey literature, archival analysis and informant interviews were used for analysis. An internationally validated tool was used for data collection and analysis. Analysis of data showed that devolution reform of 2001 has changed the power holder scenario in the Health sector all the way down from the National level to the District and Facility level, with an increased involvement of District level after devolution. On the other side there is still a conflict among various power holders, about who has the authority and has responsibility of certain managerial functions. This conflict is visible, in the way respondents identified the level of authority and responsibility for each managerial function, and the level of agreement (or disagreement) among the respondents for that function. After the devolution, lower level managerial cadre has been upgraded with new district level management system, but it has increased the role- conflict among various power-holders in health system. This role-conflict resulted in increased ambiguity and a negative impact on the managerial functions of public health. The main conclusion of the study is that health managers in Pakistan do not share same perceptions of how responsibility and authority are distributed after the devolution. Managerial powers were not clearly allocated even in past before decentralization, but post-devolution situation has further increased the role conflict in the health system. Management roles in health sector have become more ambiguous after devolution, and the impact of devolution in redistribution of management responsibility and authority has not been in a better and desired direction. A model of managerial functions in post-devolved health systems is also suggested in recommendations.