Abstract
Most access control systems prohibit illicit actions at the moment they seem to violate a security policy. While effective, such early action often clouds insight into the intentions behind negligent or willful security policy violations. Furthermore, existing control mechanisms are often very low-level; this hinders understanding because controls must be spread throughout a system. We propose SimpleFlow, a simple, information-flowbased access control system which allows illicit actions to occur up until sensitive information would have left the local network. SimpleFlow marks such illicit traffic before transmission, and this allows network devices to filter such traffic in a number of ways. SimpleFlow can also spoof intended recipients to trick malware into revealing application-layer communication messages even while blocking them. We have written SimpleFlow as a modification to the Linux kernel, and we have released our work as open source.
Cite
CITATION STYLE
Johnson, R., Lass, J., & Petullo, W. M. (2016). Studying naïve users and the insider threat with SimpleFlow. In MIST 2016 - Proceedings of the International Workshop on Managing Insider Security Threats, co-located with CCS 2016 (pp. 35–46). Association for Computing Machinery, Inc. https://doi.org/10.1145/2995959.2995960
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.