Eom et al., 2011 - Google Patents
A framework of defense system for prevention of insider's malicious behaviorsEom et al., 2011
View PDF- Document ID
- 16738508096920381372
- Author
- Eom J
- Park M
- Park S
- Chung T
- Publication year
- Publication venue
- 13th International Conference on Advanced Communication Technology (ICACT2011)
External Links
Snippet
In this paper, we proposed a framework of defense system by applying attack tree and misuse monitor for prevention of insider's malicious behaviors. Recently, a major interest of network security is the threat from insiders who execute their authorization legitimately to …
- 230000006399 behavior 0 title abstract description 27
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Homoliak et al. | Insight into insiders and it: A survey of insider threat taxonomies, analysis, modeling, and countermeasures | |
Torkura et al. | Continuous auditing and threat detection in multi-cloud infrastructure | |
Lee et al. | An effective security measures for nuclear power plant using big data analysis approach | |
Bhol et al. | Taxonomy of cyber security metrics to measure strength of cyber security | |
Greitzer et al. | Analysis of unintentional insider threats deriving from social engineering exploits | |
Legg et al. | Towards a conceptual model and reasoning structure for insider threat detection | |
Fadziso et al. | Evolution of the cyber security threat: an overview of the scale of cyber threat | |
Nostro et al. | Insider threat assessment: A model-based methodology | |
Onyshchenko et al. | Economic cybersecurity of business in Ukraine: strategic directions and implementation mechanism | |
Yamin et al. | Implementation of insider threat detection system using honeypot based sensors and threat analytics | |
Eom et al. | A framework of defense system for prevention of insider's malicious behaviors | |
Awan et al. | Identifying cyber risk hotspots: A framework for measuring temporal variance in computer network risk | |
Gunasekhar et al. | Understanding insider attack problem and scope in cloud | |
Bedi et al. | Threat‐oriented security framework in risk management using multiagent system | |
Tan et al. | Advanced persistent threats based on supply chain vulnerabilities: Challenges, solutions & future directions | |
Meinig et al. | Holistic strategy-based threat model for organizations | |
Nostro et al. | A methodology and supporting techniques for the quantitative assessment of insider threats | |
Rahman et al. | Threats from unintentional insiders: An assessment of an organization’s readiness using machine learning | |
Fagade et al. | Malicious insider threat detection: A conceptual model | |
Akhtar | Artificial intelligence (AI) within the realm of cyber security | |
Nallaperumal | CyberSecurity Analytics to Combat Cyber Crimes | |
Colajanni et al. | Cyber attacks and defenses: current capabilities and future trends | |
Wang et al. | An abnormal file access behavior detection approach based on file path diversity | |
Happe et al. | On the Surprising Efficacy of LLMs for Penetration-Testing | |
Sahin et al. | An efficient firewall for web applications (EFWA) |