首页> 外文会议>IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering >Preparing for the Next Wikileaks: Making Forensics Techniques Work
【24h】

Preparing for the Next Wikileaks: Making Forensics Techniques Work

机译:为下一个维基解密准备:制造取证技术工作

获取原文

摘要

The success of Manning in acquiring and releasing US State Department cables provides strong implications for the likelihood of similar insider threat attacks occurring again in the future. Such future attacks will likely employ more sophisticated methodologies. The first goal of this paper is to begin examining what such sophisticated insider threat attacks might include. Traditionally, organizations have avoided employing insider threat detection mechanisms due to the high rate of false positives and false negatives. This is a consequence of the chaotic nature and sheer volume of data needing analysis. A second goal of this paper is to begin proposing mechanism by which insider threat detection can be made feasible, especially in critical domains. More specifically this paper proposes multiple layers of event detection which when correlated over time will provide identification of significant irregularities requiring investigation.
机译:曼宁在获取和发布美国国务院电缆的成功为未来再次发生的类似内幕威胁攻击的可能性提供了强烈的含义。这种未来的攻击可能会采用更复杂的方法。本文的第一个目标是开始检查这种复杂的内幕威胁攻击可能包括什么。传统上,组织避免了由于虚假阳性和假阴性的高率而采用内幕威胁检测机制。这是需要分析的混沌性质和纯粹体积的数据的结果。本文的第二个目的是开始提出的机制,其中内幕威胁检测可以是可行的,特别是在关键域中。更具体地说,本文提出了多层事件检测,当随时间相关时提供了识别需要调查的显着不规则性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号