- Tytuł:
- Mining file repository accesses for detecting data exfiltration activities
- Autorzy:
-
Hu, Y.
Frank, C.
Walden, J.
Crawford, E.
Kasturiratna, D. - Powiązania:
- https://bibliotekanauki.pl/articles/91636.pdf
- Data publikacji:
- 2012
- Wydawca:
- Społeczna Akademia Nauk w Łodzi. Polskie Towarzystwo Sieci Neuronowych
- Tematy:
-
data exfiltration
file repository
KDE - Opis:
- Studies show that a significant number of employees steal data when changing jobs. Insider attackers who have the authorization to access the best-kept secrets of organizations pose a great challenge for organizational security. Although increasing efforts have been spent on identifying insider attacks, little research concentrates on detecting data exfiltration activities. This paper proposes a model for identifying data exfiltration activities by insiders. It measures the concentration of file repository access data for finding certain suspicious activities. It also uses statistical methods to profile legitimate uses of file repositories by authorized users. By analyzing legitimate file repository access logs, user access profiles are created and can be employed to detect a large set of data exfiltration activities. The effectiveness of the proposed model was tested with file access histories from the subversion logs of the popular open source project KDE.
- Źródło:
-
Journal of Artificial Intelligence and Soft Computing Research; 2012, 2, 1; 31-41
2083-2567
2449-6499 - Pojawia się w:
- Journal of Artificial Intelligence and Soft Computing Research
- Dostawca treści:
- Biblioteka Nauki