An Approach for Stego-Insider Detection Based on a Hybrid NoSQL Database

One of the reasons for the implementation of information security threats in organizations is the insider activity of its employees. There is a big challenge to detect stego-insiders-employees who create stego-channels to secretly receive malicious information and transfer confidential information a...

Full description

Bibliographic Details
Main Authors: Igor Kotenko, Andrey Krasov, Igor Ushakov, Konstantin Izrailov
Format: Article
Language:English
Published: MDPI AG 2021-03-01
Series:Journal of Sensor and Actuator Networks
Subjects:
Online Access:https://www.mdpi.com/2224-2708/10/2/25
_version_ 1797539502644789248
author Igor Kotenko
Andrey Krasov
Igor Ushakov
Konstantin Izrailov
author_facet Igor Kotenko
Andrey Krasov
Igor Ushakov
Konstantin Izrailov
author_sort Igor Kotenko
collection DOAJ
description One of the reasons for the implementation of information security threats in organizations is the insider activity of its employees. There is a big challenge to detect stego-insiders-employees who create stego-channels to secretly receive malicious information and transfer confidential information across the organization’s perimeter. Especially presently, with great popularity of wireless sensor networks (WSNs) and Internet of Things (IoT) devices, there is a big variety of information that could be gathered and processed by stego-insiders. Consequently, the problem arises of identifying such intruders and their transmission channels. The paper proposes an approach to solving this problem. The paper provides a review of the related works in terms of insider models and methods of their identification, including techniques for handling insider attacks in WSN, as well methods of embedding and detection of stego-embeddings. This allows singling out the basic features of stego-insiders, which could be determined by their behavior in the network. In the interests of storing these attributes of user behavior, as well as storing such attributes from large-scale WSN, a hybrid NoSQL database is created based on graph and document-oriented approaches. The algorithms for determining each of the features using the NoSQL database are specified. The general scheme of stego-insider detection is also provided. To confirm the efficiency of the approach, an experiment was carried out on a real network. During the experiment, a database of user behavior was collected. Then, user behavior features were retrieved from the database using special SQL queries. The analysis of the results of SQL queries is carried out, and their applicability for determining the attribute is justified. Weak points of the approach and ways to improve them are indicated.
first_indexed 2024-03-10T12:46:53Z
format Article
id doaj.art-d3359ee57d624c199a8879352988b2b9
institution Directory Open Access Journal
issn 2224-2708
language English
last_indexed 2024-03-10T12:46:53Z
publishDate 2021-03-01
publisher MDPI AG
record_format Article
series Journal of Sensor and Actuator Networks
spelling doaj.art-d3359ee57d624c199a8879352988b2b92023-11-21T13:27:03ZengMDPI AGJournal of Sensor and Actuator Networks2224-27082021-03-011022510.3390/jsan10020025An Approach for Stego-Insider Detection Based on a Hybrid NoSQL DatabaseIgor Kotenko0Andrey Krasov1Igor Ushakov2Konstantin Izrailov3St. Petersburg Federal Research Center of the Russian Academy of Sciences, 199178 St. Petersburg, RussiaDepartment of Secured Communication Systems, The Bonch-Bruevich State University of Telecommunications, 199178 St. Petersburg, RussiaDepartment of Secured Communication Systems, The Bonch-Bruevich State University of Telecommunications, 199178 St. Petersburg, RussiaSt. Petersburg Federal Research Center of the Russian Academy of Sciences, 199178 St. Petersburg, RussiaOne of the reasons for the implementation of information security threats in organizations is the insider activity of its employees. There is a big challenge to detect stego-insiders-employees who create stego-channels to secretly receive malicious information and transfer confidential information across the organization’s perimeter. Especially presently, with great popularity of wireless sensor networks (WSNs) and Internet of Things (IoT) devices, there is a big variety of information that could be gathered and processed by stego-insiders. Consequently, the problem arises of identifying such intruders and their transmission channels. The paper proposes an approach to solving this problem. The paper provides a review of the related works in terms of insider models and methods of their identification, including techniques for handling insider attacks in WSN, as well methods of embedding and detection of stego-embeddings. This allows singling out the basic features of stego-insiders, which could be determined by their behavior in the network. In the interests of storing these attributes of user behavior, as well as storing such attributes from large-scale WSN, a hybrid NoSQL database is created based on graph and document-oriented approaches. The algorithms for determining each of the features using the NoSQL database are specified. The general scheme of stego-insider detection is also provided. To confirm the efficiency of the approach, an experiment was carried out on a real network. During the experiment, a database of user behavior was collected. Then, user behavior features were retrieved from the database using special SQL queries. The analysis of the results of SQL queries is carried out, and their applicability for determining the attribute is justified. Weak points of the approach and ways to improve them are indicated.https://www.mdpi.com/2224-2708/10/2/25cybersecuritystego-insiderNoSQL databasesteganographyattacks
spellingShingle Igor Kotenko
Andrey Krasov
Igor Ushakov
Konstantin Izrailov
An Approach for Stego-Insider Detection Based on a Hybrid NoSQL Database
Journal of Sensor and Actuator Networks
cybersecurity
stego-insider
NoSQL database
steganography
attacks
title An Approach for Stego-Insider Detection Based on a Hybrid NoSQL Database
title_full An Approach for Stego-Insider Detection Based on a Hybrid NoSQL Database
title_fullStr An Approach for Stego-Insider Detection Based on a Hybrid NoSQL Database
title_full_unstemmed An Approach for Stego-Insider Detection Based on a Hybrid NoSQL Database
title_short An Approach for Stego-Insider Detection Based on a Hybrid NoSQL Database
title_sort approach for stego insider detection based on a hybrid nosql database
topic cybersecurity
stego-insider
NoSQL database
steganography
attacks
url https://www.mdpi.com/2224-2708/10/2/25
work_keys_str_mv AT igorkotenko anapproachforstegoinsiderdetectionbasedonahybridnosqldatabase
AT andreykrasov anapproachforstegoinsiderdetectionbasedonahybridnosqldatabase
AT igorushakov anapproachforstegoinsiderdetectionbasedonahybridnosqldatabase
AT konstantinizrailov anapproachforstegoinsiderdetectionbasedonahybridnosqldatabase
AT igorkotenko approachforstegoinsiderdetectionbasedonahybridnosqldatabase
AT andreykrasov approachforstegoinsiderdetectionbasedonahybridnosqldatabase
AT igorushakov approachforstegoinsiderdetectionbasedonahybridnosqldatabase
AT konstantinizrailov approachforstegoinsiderdetectionbasedonahybridnosqldatabase