Movatterモバイル変換


[0]ホーム

URL:


Johnson et al., 2016 - Google Patents

Studying naïve users and the insider threat with SimpleFlow

Johnson et al., 2016

ViewPDF
Document ID
11385302186959614997
Author
Johnson R
Lass J
Petullo W
Publication year
Publication venue
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats

External Links

Snippet

Most access control systems prohibit illicit actions at the moment they seem to violate a security policy. While effective, such early action often clouds insight into the intentions behind negligent or willful security policy violations. Furthermore, existing control …
Continue reading atdl.acm.org (PDF) (other versions)

Classifications

The classifications are assigned by a computer and are not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the classifications listed.
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0254Stateful filtering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Similar Documents

PublicationPublication DateTitle
US12192170B2 (en)System and method for implementing content and network security inside a chip
US9832227B2 (en)System and method for network level protection against malicious software
Caswell et al.Snort intrusion detection and prevention toolkit
US6684329B1 (en)System and method for increasing the resiliency of firewall systems
ES2768049T3 (en) Procedures and systems to secure and protect repositories and directories
Dutta et al.Intrusion detection systems fundamentals
Johnson et al.Studying naïve users and the insider threat with SimpleFlow
MonteiroHow intrusion detection can improve software decoy applications
Mirabella et al.A Portable Research Honeypot for Corporate Networks
Sharma et al.STADS: security threats assessment and diagnostic system in software defined networking (SDN)
AlharkanIDSaaS: Intrusion Detection system as a Service in public clouds
SchmittA Framework for Cyber Vulnerability Assessments of InfiniBand Networks
AlshayaSoftware-Defined Networking Security Techniques and the Digital Forensics of the SDN Control Plane
Shockley et al.Using VisorFlow to control information flow without modifying the operating system Kernel or its Userspace
KalilPolicy Creation and Bootstrapping System for Customer Edge Switching
UusiheimalaAdvanced threat detection through Snort integration: a study of IDS/IPS implementation at an institute of higher education
LeiBuilding Infrastructure Support for Organizational Security: An Approach to Network
CN120223446A (en) Intrusion security detection methods, devices, equipment, media and program products
RothDeveloping of a methodology for evaluation of targeted cyber attacks using exploits on ARM-based Industrial IoT devices
Bakos et al.Ubiquitous Redirection as Access Control Response.
Mohamed KherInternet Home Security
ClaytonNetwork Attack and Defence
MARTYKÁNVIRTUALIZED ENVI RON MENT FOR ANALYSIS OF MALWARE TRAFFIC
TuftsNetwork Based Malware Defense
DhootDEVELOPING A LOW COST SOLUTION FOR ENTERPRISE SECURITY

[8]
ページ先頭

©2009-2025 Movatter.jp