Bowen et al., 2010 - Google Patents
Monitoring technologies for mitigating insider threatsBowen et al., 2010
View PDF- Document ID
- 14948120268874205974
- Author
- Bowen B
- Salem M
- Keromytis A
- Stolfo S
- Publication year
- Publication venue
- Insider Threats in Cyber Security
External Links
Snippet
In this chapter, we propose a design for an insider threat detection system that combines an array of complementary techniques that aims to detect evasive adversaries. We are motivated by real world incidents and our experience with building isolated detectors: such …
- 230000000116 mitigating 0 title description 13
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19654—Details concerning communication with a camera
- G08B13/19656—Network used to communicate with a camera, e.g. WAN, LAN, Internet
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bowen et al. | Designing host and network sensors to mitigate the insider threat | |
Bowen et al. | Baiting inside attackers using decoy documents | |
Han et al. | Deception techniques in computer security: A research perspective | |
US9501639B2 (en) | Methods, systems, and media for baiting inside attackers | |
Alshamrani et al. | A survey on advanced persistent threats: Techniques, solutions, challenges, and research opportunities | |
US8769684B2 (en) | Methods, systems, and media for masquerade attack detection by monitoring computer user behavior | |
Ben Salem et al. | Decoy document deployment for effective masquerade attack detection | |
Voris et al. | Bait and snitch: Defending computer systems with decoys | |
US20120084866A1 (en) | Methods, systems, and media for measuring computer security | |
US9356957B2 (en) | Systems, methods, and media for generating bait information for trap-based defenses | |
US9971891B2 (en) | Methods, systems, and media for detecting covert malware | |
Sheen et al. | R-Sentry: Deception based ransomware detection using file access patterns | |
WO2009032379A1 (en) | Methods and systems for providing trap-based defenses | |
Lazarov et al. | Honey sheets: What happens to leaked google spreadsheets? | |
Bowen et al. | Monitoring technologies for mitigating insider threats | |
Stolfo et al. | Insider threat defense | |
Vishnu et al. | Identifying key strategies for reconnaissance in cybersecurity | |
Ben Salem et al. | Combining a baiting and a user search profiling techniques for masquerade detection | |
Sarath et al. | Malware forensics analysis and detection in cyber physical systems | |
Moussaileb | Log analysis for malicious software detection | |
Ben Salem | Towards effective masquerade attack detection | |
Verma | Production honeypots: An organization’s view | |
Cornellisen | Covert Channel Data Leakage Protection | |
Bowen | Design and analysis of decoy systems for computer security | |
Edwards et al. | Effectively Testing APT Defences: Defining threats, addressing objections to testing and suggesting some practical approaches |