[go: up one dir, main page]

Bowen et al., 2010 - Google Patents

Monitoring technologies for mitigating insider threats

Bowen et al., 2010

View PDF
Document ID
14948120268874205974
Author
Bowen B
Salem M
Keromytis A
Stolfo S
Publication year
Publication venue
Insider Threats in Cyber Security

External Links

Snippet

In this chapter, we propose a design for an insider threat detection system that combines an array of complementary techniques that aims to detect evasive adversaries. We are motivated by real world incidents and our experience with building isolated detectors: such …
Continue reading at www.cs.columbia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19654Details concerning communication with a camera
    • G08B13/19656Network used to communicate with a camera, e.g. WAN, LAN, Internet

Similar Documents

Publication Publication Date Title
Bowen et al. Designing host and network sensors to mitigate the insider threat
Bowen et al. Baiting inside attackers using decoy documents
Han et al. Deception techniques in computer security: A research perspective
US9501639B2 (en) Methods, systems, and media for baiting inside attackers
Alshamrani et al. A survey on advanced persistent threats: Techniques, solutions, challenges, and research opportunities
US8769684B2 (en) Methods, systems, and media for masquerade attack detection by monitoring computer user behavior
Ben Salem et al. Decoy document deployment for effective masquerade attack detection
Voris et al. Bait and snitch: Defending computer systems with decoys
US20120084866A1 (en) Methods, systems, and media for measuring computer security
US9356957B2 (en) Systems, methods, and media for generating bait information for trap-based defenses
US9971891B2 (en) Methods, systems, and media for detecting covert malware
Sheen et al. R-Sentry: Deception based ransomware detection using file access patterns
WO2009032379A1 (en) Methods and systems for providing trap-based defenses
Lazarov et al. Honey sheets: What happens to leaked google spreadsheets?
Bowen et al. Monitoring technologies for mitigating insider threats
Stolfo et al. Insider threat defense
Vishnu et al. Identifying key strategies for reconnaissance in cybersecurity
Ben Salem et al. Combining a baiting and a user search profiling techniques for masquerade detection
Sarath et al. Malware forensics analysis and detection in cyber physical systems
Moussaileb Log analysis for malicious software detection
Ben Salem Towards effective masquerade attack detection
Verma Production honeypots: An organization’s view
Cornellisen Covert Channel Data Leakage Protection
Bowen Design and analysis of decoy systems for computer security
Edwards et al. Effectively Testing APT Defences: Defining threats, addressing objections to testing and suggesting some practical approaches