2010
DOI: 10.1016/j.cose.2010.01.002
|View full text |Cite
|
Sign up to set email alerts
|

On the detection of pod slurping attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…Kavallaris and Katos [168] use a similar methodology to defend against pod-slurping attacks, where data has been covertly copied to a USB device. They base their method on the access timestamps of files and the file transfer rates of devices, demonstrating that, with specific countermeasures, host systems storing confidential data can not only detect but protect themselves against duplication to unauthorised devices.…”
Section: Probabilistic Forensicsmentioning
confidence: 99%
See 1 more Smart Citation
“…Kavallaris and Katos [168] use a similar methodology to defend against pod-slurping attacks, where data has been covertly copied to a USB device. They base their method on the access timestamps of files and the file transfer rates of devices, demonstrating that, with specific countermeasures, host systems storing confidential data can not only detect but protect themselves against duplication to unauthorised devices.…”
Section: Probabilistic Forensicsmentioning
confidence: 99%
“…Grier [166] In use A method to find out whether a file has been copied or not based on examination of file system. Patel & Singh [167] In use A technique for providing ease in differentiating between copy operation and rest of the operations Kavallaris & Katos [168] In use An approach for preventing data being copied to an un-authorized USB device Papadimitriou & Garcia-Molina [169] In use A model for identification of guilty trusted party who has leaked data Wang et al [170] In use A technique based on probabilistic analysis to identify the insider who leaked data Kumar et al [171] In use An approach for smart data allocation which helps in tracing the data leaker Krishnan et al [172] In use An approach for post-exfiltration analysis to identify what, when and how based on reconstruction of events using logged data from the hypervisor Yu et al [173] In use A technique for identification of the path used for exfiltration of data using statistical analysis Xu et al [174] In use A technique based on probabilistic analysis to identify path and responsible party for data leakage Counter-Intelligence Operation Deng et al [177] In use An approach for tracing the traitor who illegally distribute access credentials of a cloud application Ikegami & Yamauch [175] In use An approach that detects, prevents and tracks the attacker Alexander et al [176] In use A technique for hiding detective and investigative software from the attacker using rootkit Fig. 13 shows the mapping of the attack vectors identified in section 3 onto the countermeasures reported in section 4.3.…”
Section: Probabilistic Forensicsmentioning
confidence: 99%