[go: up one dir, main page]

Eom et al., 2011 - Google Patents

A framework of defense system for prevention of insider's malicious behaviors

Eom et al., 2011

View PDF
Document ID
16738508096920381372
Author
Eom J
Park M
Park S
Chung T
Publication year
Publication venue
13th International Conference on Advanced Communication Technology (ICACT2011)

External Links

Snippet

In this paper, we proposed a framework of defense system by applying attack tree and misuse monitor for prevention of insider's malicious behaviors. Recently, a major interest of network security is the threat from insiders who execute their authorization legitimately to …
Continue reading at www.icact.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service

Similar Documents

Publication Publication Date Title
Homoliak et al. Insight into insiders and it: A survey of insider threat taxonomies, analysis, modeling, and countermeasures
Torkura et al. Continuous auditing and threat detection in multi-cloud infrastructure
Lee et al. An effective security measures for nuclear power plant using big data analysis approach
Bhol et al. Taxonomy of cyber security metrics to measure strength of cyber security
Greitzer et al. Analysis of unintentional insider threats deriving from social engineering exploits
Legg et al. Towards a conceptual model and reasoning structure for insider threat detection
Fadziso et al. Evolution of the cyber security threat: an overview of the scale of cyber threat
Nostro et al. Insider threat assessment: A model-based methodology
Onyshchenko et al. Economic cybersecurity of business in Ukraine: strategic directions and implementation mechanism
Yamin et al. Implementation of insider threat detection system using honeypot based sensors and threat analytics
Eom et al. A framework of defense system for prevention of insider's malicious behaviors
Awan et al. Identifying cyber risk hotspots: A framework for measuring temporal variance in computer network risk
Gunasekhar et al. Understanding insider attack problem and scope in cloud
Bedi et al. Threat‐oriented security framework in risk management using multiagent system
Tan et al. Advanced persistent threats based on supply chain vulnerabilities: Challenges, solutions & future directions
Meinig et al. Holistic strategy-based threat model for organizations
Nostro et al. A methodology and supporting techniques for the quantitative assessment of insider threats
Rahman et al. Threats from unintentional insiders: An assessment of an organization’s readiness using machine learning
Fagade et al. Malicious insider threat detection: A conceptual model
Akhtar Artificial intelligence (AI) within the realm of cyber security
Nallaperumal CyberSecurity Analytics to Combat Cyber Crimes
Colajanni et al. Cyber attacks and defenses: current capabilities and future trends
Wang et al. An abnormal file access behavior detection approach based on file path diversity
Happe et al. On the Surprising Efficacy of LLMs for Penetration-Testing
Sahin et al. An efficient firewall for web applications (EFWA)