2009
DOI: 10.1109/msp.2009.109
|View full text |Cite
|
Sign up to set email alerts
|

Designing Host and Network Sensors to Mitigate the Insider Threat

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
30
0
1

Year Published

2010
2010
2018
2018

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 47 publications
(31 citation statements)
references
References 7 publications
(3 reference statements)
0
30
0
1
Order By: Relevance
“…For instance, regarding the SMTP traffic, we plan to increase the number and diversity of the innocuous email messages that we currently use, and also create new variations based on message templates. Some of the messages could also contain "bait" documents [10] that would ping back to our system in case someone opened them. We can also use some of the techniques described by Bowen et al [9] to generate even more realistic decoy traffic.…”
Section: Decoy Traffic Credibilitymentioning
confidence: 99%
See 1 more Smart Citation
“…For instance, regarding the SMTP traffic, we plan to increase the number and diversity of the innocuous email messages that we currently use, and also create new variations based on message templates. Some of the messages could also contain "bait" documents [10] that would ping back to our system in case someone opened them. We can also use some of the techniques described by Bowen et al [9] to generate even more realistic decoy traffic.…”
Section: Decoy Traffic Credibilitymentioning
confidence: 99%
“…These systems, widely known as honeypots [25,30], have no production value other than being compromised, and subsequently track the actions of the attacker. Honeypots have been extensively used for modeling, logging, and analyzing attacks originating from sources external to an organization [17,36], as well as internal attacks launched from within its perimeter [10].…”
Section: Related Workmentioning
confidence: 99%
“…Indeed in many cases, formal security policies are incomplete and implicit or they are purposely ignored in order to get business goals accomplished. Even most recent studies estimate that no mechanism exists to prevent insider abuse [11]. According to [12], there seems to be little design and technology available to address the insider threat problem.…”
Section: Risks Related With Treatment Process and Data Analysis: The mentioning
confidence: 99%
“…., 100. It is observed that the bulks of the self 2 Note that such sequences are not by any means actual attacks. However, our emphasis here is not on the consequences of the adversary's actions in a real setting, but rather on the assumpion that attacks are anomalous events which nonetheless might be conveniently camouflaged to avoid detection.…”
Section: ) Attack Generationmentioning
confidence: 99%
“…Research on this area has been in place for the last 20 years and, to some extent, has proliferated lately (see e.g. [33], [3], [2], [7] for a few examples of recently reported research initiatives).…”
Section: Introductionmentioning
confidence: 99%