Studying Naive Users And The Insider Threat With Simpleflow

MIST'16: PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON MANAGING INSIDER SECURITY THREATS(2016)

引用 5|浏览0
暂无评分
摘要
Most access control systems prohibit illicit actions at the moment they seem to violate a security policy. While effective, such early action often clouds insight into the intentions behind negligent or willful security policy violations. Furthermore, existing control mechanisms are often very low-level; this hinders understanding because controls must be spread throughout a system. We propose Simple Flow, a simple, information-flow-based access control system which allows illicit actions to occur up until sensitive information would have left the local network. Simple Flow marks such illicit traffic before transmission, and this allows network devices to filter such traffic in a number of ways. Simple Flow can also spoof intended recipients to trick malware into revealing application-layer communication messages even while blocking them. We have written Simple Flow as a modification to the Linux kernel, and we have released our work as open source.
更多
查看译文
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要