Bifrost: A Statistical Analysis Framework for Detecting Insider Threat Activities on Cyber Systems - Monitoring Network Resources Against Hosts Who Exhibit Threat Characteristics of Insider Activity Bifrost: A Statistical Analysis Framework for Detecting Insider Threat Activities on Cyber Systems - Monitoring Network Resources Against Hosts Who Exhibit Threat Characteristics of Insider Activity

Bifrost: A Statistical Analysis Framework for Detecting Insider Threat Activities on Cyber Systems - Monitoring Network Resources Against Hosts Who Exhibit Threat Characteristics of Insider Activity

    • £5.99
    • £5.99

Publisher Description

This report has been professionally converted for accurate flowing-text e-book format reproduction. The purpose of this research is to investigate, design and implement a statistical analysis-based insider threat detection product deployable to resource-disadvantaged systems and provide organizations with a method for baselining the network profiles and host activities unique to their operational environments. Our system design seeks to alert the system and its operators to invest greater monitoring resources against hosts who exhibit threat characteristics of insider activity and prevent such activities from inflicting harm on the system and/or causing an information-loss event for the organization. This system provides an initial starting point for future work, implementing one means of detecting insider threat activities; this implementation results in best- and worst-case detection rates of ~74% and ~68.2%, respectively, against our test data. We believe our framework provides a reasonable starting point for future work and improvement.

This compilation includes a reproduction of the 2019 Worldwide Threat Assessment of the U.S. Intelligence Community.

Significant effort and expense have been spent protecting information systems from external malicious threats, but relatively little has been done to evaluate the actions of legitimate users to prevent them from engaging in malicious or otherwise damaging activity. As seen in the recent DoD leaks by Edward Snowden, Bradley Manning, and Reality Winner, the insider threat possesses significant destructive potential against national security, international relations, and global commerce interests. While external threat protection systems, like antivirus software, are established to be viable threat prevention means and are ubiquitous on modern information technology (IT) systems, detection and prevention systems focused on insider threats and are far less common. Previous work to improve insider threat detection and prevention includes efforts to apply existing frameworks and techniques to malicious activity detection, but they are disparate in their methods of classifying and assigning threat potential to the various user activity indicators. These differing means of describing malicious indicators and responding to threats are also often not applicable to the DoD due to the restrictions imposed by network authorization/validation processes and concerns unique to national security systems. We seek to alleviate this issue by producing a systems-agnostic solution capable of detecting insider activity within any organization's network without the need for integration or communications with any other external system.

GENRE
Computing & Internet
RELEASED
2019
24 August
LANGUAGE
EN
English
LENGTH
118
Pages
PUBLISHER
Progressive Management
SIZE
5.3
MB

More Books Like This

Red Team in a Box (RTIB): Developing Automated Tools to Identify, Assess, and Expose Cybersecurity Vulnerabilities in Department of the Navy Systems - Cyberspace Operations and Cyber Kill Chain Red Team in a Box (RTIB): Developing Automated Tools to Identify, Assess, and Expose Cybersecurity Vulnerabilities in Department of the Navy Systems - Cyberspace Operations and Cyber Kill Chain
2019
Federal Cybersecurity Research and Development Strategic Plan: Artificial Intelligence, Quantum Information Science, Privacy, Secure Hardware and Software, Education and Workforce Development Federal Cybersecurity Research and Development Strategic Plan: Artificial Intelligence, Quantum Information Science, Privacy, Secure Hardware and Software, Education and Workforce Development
2019
Time Sensitivity in Cyberweapon Reusability: Stealth as a Critical Attribute Allowing Weaponized Software Code to be Reused, Survivability That Delays Detection to Prevent Vulnerability Patching Time Sensitivity in Cyberweapon Reusability: Stealth as a Critical Attribute Allowing Weaponized Software Code to be Reused, Survivability That Delays Detection to Prevent Vulnerability Patching
2018
The Basics of Cyber Warfare The Basics of Cyber Warfare
2012
Cyber Attacks Cyber Attacks
2012
Cyber Warfare Cyber Warfare
2013

More Books by Progressive Management

Wings in Orbit: Scientific and Engineering Legacies of the Space Shuttle, 1971-2010 Wings in Orbit: Scientific and Engineering Legacies of the Space Shuttle, 1971-2010
2011
2011 Complete Guide to IEDs: Improvised Explosive Devices: Enemy Tactics, Roadside Bombs, Counter-IED Targeting, Defeat the Device, Programs, Technologies, Afghanistan, Iraq, JIEDDO 2011 Complete Guide to IEDs: Improvised Explosive Devices: Enemy Tactics, Roadside Bombs, Counter-IED Targeting, Defeat the Device, Programs, Technologies, Afghanistan, Iraq, JIEDDO
2010
Nigeria: Federal Research Study and Country Profile with Comprehensive Information, History, and Analysis - Politics, Economy, Military Nigeria: Federal Research Study and Country Profile with Comprehensive Information, History, and Analysis - Politics, Economy, Military
2011
21st Century Guide to Solar Power and Photovoltaics: Green Domestic Power from the Sun - Practical Information about Home Electricity, Water Heating, Panel and Cells, Solar Energy Financing 21st Century Guide to Solar Power and Photovoltaics: Green Domestic Power from the Sun - Practical Information about Home Electricity, Water Heating, Panel and Cells, Solar Energy Financing
2010
The Smell of Kerosene: A Test Pilot's Odyssey - NASA Research Pilot Stories, XB-70 Tragic Collision, M2-F1 Lifting Body, YF-12 Blackbird, Apollo LLRV Lunar Landing Research Vehicle (NASA SP-4108) The Smell of Kerosene: A Test Pilot's Odyssey - NASA Research Pilot Stories, XB-70 Tragic Collision, M2-F1 Lifting Body, YF-12 Blackbird, Apollo LLRV Lunar Landing Research Vehicle (NASA SP-4108)
2012
21st Century U.S. Military Manuals: Sniper Training - FM 23-10 - Marksmanship, Equipment, Ballistics, Weapon Capabilities, Sniping Techniques (Value-Added Professional Format Series) 21st Century U.S. Military Manuals: Sniper Training - FM 23-10 - Marksmanship, Equipment, Ballistics, Weapon Capabilities, Sniping Techniques (Value-Added Professional Format Series)
2011