2012 4th Computer Science and Electronic Engineering Conference (CEEC) 2012
DOI: 10.1109/ceec.2012.6375395
|View full text |Cite
|
Sign up to set email alerts
|

An integrated data exfiltration monitoring tool for a large organization with highly confidential data source

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 2 publications
0
3
0
Order By: Relevance
“…Dynamic access control [83] is a mechanism that is heavily dependent on malicious node assumption to design advanced collision attacks called random poisoning [84]. Other studies used a mathematical model [85], unknown input observers [86], Dynamic Host Configuration Protocol DHCP starvation attack and Transmission Control Protocol TCP [87][88][89], simple statistical measures [90], and Bayesian network model to predict insider threats [91].…”
Section: Cyber Activity Behaviormentioning
confidence: 99%
“…Dynamic access control [83] is a mechanism that is heavily dependent on malicious node assumption to design advanced collision attacks called random poisoning [84]. Other studies used a mathematical model [85], unknown input observers [86], Dynamic Host Configuration Protocol DHCP starvation attack and Transmission Control Protocol TCP [87][88][89], simple statistical measures [90], and Bayesian network model to predict insider threats [91].…”
Section: Cyber Activity Behaviormentioning
confidence: 99%
“…Several proposals for detecting or preventing data exfiltration attacks exist, such as profiling legitimate user behavior and anomaly detection [27], [28], deep packet inspection techniques [29], stochastic forensics upon the filesystem [30] or a combination of traffic behavior analysis and file access patterns [31]. Dube et al [32] consider XAPTs simply as attacks that contain sophisticated malware and focus on developing a solution that identifies malware based on the assets they may target.…”
Section: Related Work a Xapt Detectionmentioning
confidence: 99%
“…State-of-the-art perimeter security solutions such as intrusion detection and prevention systems (IDS/IPS), firewalls, and network traffic anomaly detection are per se generally not capable of detecting insider attacks [20]. However, such activities typically leave traces in the network and on the involved systems, which can be used to spot potential misuse in real time or to reconstruct and document the sequence of events associated with an exfiltration and its scope ex-post.…”
Section: Introductionmentioning
confidence: 99%