• Login
    • Login
    Advanced Search
    View Item 
    •   UoN Digital Repository Home
    • Theses and Dissertations
    • Faculty of Science & Technology (FST)
    • View Item
    •   UoN Digital Repository Home
    • Theses and Dissertations
    • Faculty of Science & Technology (FST)
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    User behaviour modeling in Web Application Security Monitoring:a case for a University Student and Staff Web Portal Andrew

    Thumbnail
    View/Open
    Abstract (283.4Kb)
    Date
    2013
    Author
    Kahonge, Mwaura
    Type
    Thesis
    Language
    en
    Metadata
    Show full item record

    Abstract
    This thesis discusses efforts in security monitoring and auditability in the web environment and proposes a solution that allows holistic collection and consolidation of audit trail information. When an application is breached, audit trails provide important evidence about user actions and have remained an invaluable part of system security especially when performing security audits and forensic analysis. However, due to the nature of the web architecture, a single web application will have several sub-systems that generate their own distinct log records, which are later difficult to consolidate accurately. Further, the log records themselves may not contain all evidence necessary as a result of not integrating audit requirements into the log generation process. As much as preventive measures such as intrusion detection systems are advanc­ ing, they still do not guarantee secure systems. Routine log reviews and analysis are helpful in continuous monitoring and also in identifying security incidents shortly after they have occurred. However, analyzing distinct log files from the separate sub­ systems in the web environment can only assist in measuring limited user activity as opposed to a broader or holistic perspective across the entire application. Previous efforts have focused on observing traffic between separate servers at the network level with the aim of reconstructing web and database protocol strings from network packets as well as through the use of parameterized views so that database servers get extra information from the web server. The research questions in this thesis ask about the role of audit planning in con­ text-action logging, how this influences auditability of the resultant audit trail and subsequently, whether there is an effect on security assurance. Additionally, they ask how to practically log and consolidate context and action as well as how to model user behaviour from a security perspective. This thesis makes a number of c~ntributions. Continuous User Behaviour Moni- toring Model (CUBMM) is the main contribution and it introduces the idea of integrating audit requirements of a web application into the processes of log genera- \ tion, log consolidation, log analysis and behaviour modeling. CUBMM is formulated based on a conceptual framework that we build from theory. Additionally, we imple­ ment a server side logging tool (COGNITO)that is able to perform context-actiongathering and consolidation. Further, we create a novel Behaviour Graph notation (BG) for illustrating security specific user activity. By following the experimental design as the overall research design, we apply CUBMM in our research process and embed COGNITO on a live web environment where it collects audit trail records for a number of days. To test auditability of the collected logs, we sample a set of system controls in the Web Portal and conduct a security audit with the help of several information security experts. The audit is guided by a questionnaire designed to test a set of hypotheses based on the concep­ tual framework. We then use our Behaviour Graph notation (BG) on the context-based log data gathered by COGNITO to describe activity in the system from a security perspective. Overall, results obtained indicate increased levels of confidence of audit conclu­ sions when the context-based log data is used as compared to traditional log data. Additionally, with the new logs it was possible to perform fine grained auditing where respondents could accurately determine the identity of users as well as other web context information for database transactions. This thesis concludes that integration of audit requirements to the generation and consolidation of logs will increase auditability and subsequently improve security assurance and enhance behaviour monitoring in a web application.
    URI
    http://hdl.handle.net/11295/62651
    Citation
    Doctor of Philosophy in Computer Science
    Publisher
    University of Nairobi
    Collections
    • Faculty of Science & Technology (FST) [4213]

    Copyright © 2022 
    University of Nairobi Library
    Contact Us | Send Feedback

     

     

    Useful Links
    UON HomeLibrary HomeKLISC

    Browse

    All of UoN Digital RepositoryCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

    My Account

    LoginRegister

    Copyright © 2022 
    University of Nairobi Library
    Contact Us | Send Feedback