2013 46th Hawaii International Conference on System Sciences 2013
DOI: 10.1109/hicss.2013.278
|View full text |Cite
|
Sign up to set email alerts
|

Insider Threat Detection Using Virtual Machine Introspection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…Legg et al [138] analyzed and explored device usage features using PCA, and Aditham et al [139] used a semi-supervised approach to investigate the multiple features of memory access. For insider threat detection, Crawford and Peterson [140], Meng et al [141], and Chiu et al [142] used a methodology that is dependent on scanning the memory of running virtual machines, a Bayesian inference-based trust mechanism, and a frequent pattern outlier factor, respectively. The works [143][144][145][146][147] highlighted correlation coefficient methods and kernel density estimation (KDE) to determine CPU usage, a medium access layer MAC based solution, design science research to detect USB usage, a fuzzy multi-criteria aggregation method, and the hidden Markov model (HMM) and Baum-Welch algorithm to model resource misuse, respectively.…”
Section: Cyber Activity Behaviormentioning
confidence: 99%
“…Legg et al [138] analyzed and explored device usage features using PCA, and Aditham et al [139] used a semi-supervised approach to investigate the multiple features of memory access. For insider threat detection, Crawford and Peterson [140], Meng et al [141], and Chiu et al [142] used a methodology that is dependent on scanning the memory of running virtual machines, a Bayesian inference-based trust mechanism, and a frequent pattern outlier factor, respectively. The works [143][144][145][146][147] highlighted correlation coefficient methods and kernel density estimation (KDE) to determine CPU usage, a medium access layer MAC based solution, design science research to detect USB usage, a fuzzy multi-criteria aggregation method, and the hidden Markov model (HMM) and Baum-Welch algorithm to model resource misuse, respectively.…”
Section: Cyber Activity Behaviormentioning
confidence: 99%
“…In addition, some of the related insider threats such as an unresolved alarms threat, misconfiguration threat and incorrect setting threat [35] also can be the cause to interruption between the machines itself [46]. Additionally, insiders also might technically attempt to disable monitoring machine before being able to disrupt or shut down or undertaking the machine used on their workstation [47]. For example, the insider wants to take over a machine that containing binary information from MPLC (C).…”
Section: Framework Of Automated Manufacturing Execution Systemmentioning
confidence: 99%
“…VMI emerges as a feasible method to provide insight into a VM [7], so it can acquire evidence with less contamination. VMI can be carried out basically by two methods as depicted in Fig.…”
Section: Virtualization and Vmimentioning
confidence: 99%