2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS) 2011
DOI: 10.1109/cicybs.2011.5949404
|View full text |Cite
|
Sign up to set email alerts
|

Profiling file repository access patterns for identifying data exfiltration activities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(10 citation statements)
references
References 6 publications
0
10
0
Order By: Relevance
“…The proposed idea of this framework is more feasible to keep track of cyber security-based detection. The proposed approach is based on any unauthorized movement of data by insider threats [29]. It uses file repositories, which is the statistical method for authorized or legitimate users.…”
Section: Related Workmentioning
confidence: 99%
“…The proposed idea of this framework is more feasible to keep track of cyber security-based detection. The proposed approach is based on any unauthorized movement of data by insider threats [29]. It uses file repositories, which is the statistical method for authorized or legitimate users.…”
Section: Related Workmentioning
confidence: 99%
“…Additionally, rule mining, feature analysis using the One-Class Support Vector Machine (OCSVM), and other cryptographic techniques including watermarking were used to detect an insider threat [29]. Furthermore, according to Hu et al [29], that a sizable portion of employees steal data when switching jobs.…”
Section: Related Workmentioning
confidence: 99%
“…Additionally, rule mining, feature analysis using the One-Class Support Vector Machine (OCSVM), and other cryptographic techniques including watermarking were used to detect an insider threat [29]. Furthermore, according to Hu et al [29], that a sizable portion of employees steal data when switching jobs. In other words, insider attackers who are authorised to access an organization's best-kept secrets provide a significant risk to organisational security.…”
Section: Related Workmentioning
confidence: 99%
“…The features of the user database and file access patterns have been studied by Hu et al [110] using statistical methods, a community anomaly detection system applying a relational framework [111], One-Class Support Vector Machine OCSVM to analyze features [112], rule mining [113], and cryptographic techniques and watermarking [114]. A probabilistic mechanism was used to re-encrypt files [115], the scoring function [116], the naive Bayes algorithm, and vector space model (VSM) [117].…”
Section: Cyber Activity Behaviormentioning
confidence: 99%
“…[ 35,45,[62][63][64][65][66][67][68]97,101,105,106,110,112,117,121,124,131,133,182,194] Time complexity…”
Section: Roc or Aucmentioning
confidence: 99%