Proceedings of the 2010 ACM Workshop on Insider Threats 2010
DOI: 10.1145/1866886.1866894
|View full text |Cite
|
Sign up to set email alerts
|

Detecting insider activity using enhanced directory virtualization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 3 publications
0
5
0
Order By: Relevance
“…Misuse-Based. Aimed at insiders performing data exfiltration resulting into underlying changes to the integrity of directory services, Claycomb and Shin [2010] proposed a combination of policy with monitoring, which leverages the capabilities of directory virtualization. Hanley and Montelibano [2011] demonstrated the utilization of signature alerts in the SPLUNK logging engine for the detection of data exfiltration.…”
Section: Operational Workmentioning
confidence: 99%
“…Misuse-Based. Aimed at insiders performing data exfiltration resulting into underlying changes to the integrity of directory services, Claycomb and Shin [2010] proposed a combination of policy with monitoring, which leverages the capabilities of directory virtualization. Hanley and Montelibano [2011] demonstrated the utilization of signature alerts in the SPLUNK logging engine for the detection of data exfiltration.…”
Section: Operational Workmentioning
confidence: 99%
“…Detecting malicious insider activity in virtualization environments is a challenging task, which is further compounded if the insider has administrative access to the virtualization resources [6]. It may be plausible that an administrative user with high expertise in the virtual computing environment can procure the requisite amount of resources from that environment to perform denialof-service (DoS) or man-in-the-middle attacks.…”
Section: Vulnerability Exploitation In Virtual Computing Environmentsmentioning
confidence: 99%
“…It may be plausible that an administrative user with high expertise in the virtual computing environment can procure the requisite amount of resources from that environment to perform denialof-service (DoS) or man-in-the-middle attacks. The administrator user is much more likely to know about detection mechanisms and countermeasures and how to defeat them to compromise, steal, exploit or tamper with the virtual computing environment for personal gain [6]. Therefore, when assessing the robustness of a secure virtual computing environment, these types of threats should also be taken into consideration.…”
Section: Vulnerability Exploitation In Virtual Computing Environmentsmentioning
confidence: 99%
“…Malicious Activities Detection Engine (MADE) [10] has been proposed by Claycomb et al This system focuses on a directory service and monitors changes in the directory. The system alerts administrators when the directory change violates the predefined policies.…”
Section: A Access Controlmentioning
confidence: 99%