首页> 外文会议>Annual IEEE International Carnahan Conference on Security Technology >AD2: Anomaly detection on active directory log data for insider threat monitoring
【24h】

AD2: Anomaly detection on active directory log data for insider threat monitoring

机译:AD2:异常检测Active Directory对内幕威胁监控的数据

获取原文

摘要

What you see is not definitely believable is not a rare case in the cyber security monitoring. However, due to various tricks of camouflages, such as packing or virutal private network (VPN), detecting "advanced persistent threat"(APT) by only signature based malware detection system becomes more and more intractable. On the other hand, by carefully modeling users' subsequent behaviors of daily routines, probability for one account to generate certain operations can be estimated and used in anomaly detection. To the best of our knowledge so far, a novel behavioral analytic framework, which is dedicated to analyze Active Directory domain service logs and to monitor potential inside threat, is now first proposed in this project. Experiments on real dataset not only show that the proposed idea indeed explores a new feasible direction for cyber security monitoring, but also gives a guideline on how to deploy this framework to various environments.
机译:你所看到的不是绝对可信的不是一个罕见的网络安全监测案例。然而,由于伪装的各种技巧,例如包装或恶作剧私有网络(VPN),通过仅基于签名的恶意软件检测系统检测“高级持久威胁”(APT)变得越来越难以解决。另一方面,通过仔细建模用户的后续行为的日常例程,可以估计生成某些操作的帐户的概率并用于异常检测。据我们迄今为止,迄今为止最好的行为分析框架,专门用于分析Active Directory域服务日志并监控威胁的潜在威胁,现在在该项目中首次提出。 real dataSet上的实验不仅显示提出的想法确实探讨了网络安全监控的新可行方向,而且还提供了如何将此框架部署到各种环境的指导方针。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号