The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2020 IEEE Conference on Communications and Network Security (CNS) 2020
DOI: 10.1109/cns48642.2020.9162260
|View full text |Cite
|
Sign up to set email alerts
|

Insider Attack Detection for Science DMZs Using System Performance Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 18 publications
0
1
0
Order By: Relevance
“…For instance, CPU capacity is valuable to cryptomining malware, which hijacks infected computers to mine crypto-currency for the criminals [19]. In another direction, protecting the data confidentiality and preventing data leakage are important concerns of Science DMZ [20]. Our main focus is on unauthorized use of DTN computing and network resources by attackers who have access to information on these infrastructures and their ML methods from public sources.…”
Section: Related Work: a Brief Accountmentioning
confidence: 99%
“…For instance, CPU capacity is valuable to cryptomining malware, which hijacks infected computers to mine crypto-currency for the criminals [19]. In another direction, protecting the data confidentiality and preventing data leakage are important concerns of Science DMZ [20]. Our main focus is on unauthorized use of DTN computing and network resources by attackers who have access to information on these infrastructures and their ML methods from public sources.…”
Section: Related Work: a Brief Accountmentioning
confidence: 99%
“…Several authors have addressed these problems by implementing non-invasive mechanisms for traffic analysis in Science DMZ. Insider attack detection system for Science DMZ is implemented in [16] by measuring the CPU load, disk usage, along with network activity. In [17], efficient traffic monitoring for Science DMZ is studied, avoiding the typical Deep Packet Inspection (DPI) mechanism and considering a lightweight side-channel based abnormality detection supported by a basic rule.…”
Section: Science Dmzmentioning
confidence: 99%