2020
DOI: 10.1007/s41635-020-00092-z
|View full text |Cite
|
Sign up to set email alerts
|

USB-Watch: a Generalized Hardware-Assisted Insider Threat Detection Framework

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…Additionally, the framework employs a decision tree anomaly detection classifier, which is implemented in the hardware itself. This classifier analyses the behavioral patterns of connected USB devices, allowing for the detection of anomalous behavior [19]. However, this method is not effective with insider threats which do not need USB connections.…”
Section: Literature Review and Related Workmentioning
confidence: 99%
“…Additionally, the framework employs a decision tree anomaly detection classifier, which is implemented in the hardware itself. This classifier analyses the behavioral patterns of connected USB devices, allowing for the detection of anomalous behavior [19]. However, this method is not effective with insider threats which do not need USB connections.…”
Section: Literature Review and Related Workmentioning
confidence: 99%
“…An internet server can easily deduce the hopcount information from the IP Header's Time-to-Live (TTL) field. Using the IP to hop-count mapping, the server can distinguish between legitimate and spoofed IP packets [9,10], review [11] on Route Optimization in MIPv6 Experimental Test Bed for Network Mobility": "Trade off Analysis and Evaluation While in [12] demonstrates Zero Day Attack Prediction with Parameter Setting Using Bi Direction Recurrent Neural Network in Cyber Security. This work will improve upon a filtering technique known as Dynamic Path Update Based Hop Count Filtering, which has been used to detect and discard spoofed IP packets".…”
Section: Immune-inspiredmentioning
confidence: 99%
“…USB packet scanners and filters are tools that monitor the USB packets exchanged between the host and the device. USB-Watch is a framework that aims to identify rogue anomalous USB device behavior by analyzing the traffic exchanged with the host [30]. It is custom hardware that uses a Decision Tree anomaly detection classifier.…”
Section: Usb Defensesmentioning
confidence: 99%
“…Existing packet scanning tools like USB-Watch [30], GoodUSB [31] and USBFilter [32] are designed to monitor and control the packet exchanges between the host and the device, aiming to mitigate USB security threats. However, these tools might not be completely effective in preventing intrusions due to the inherent complexities of security-critical systems.…”
Section: Usb Defensesmentioning
confidence: 99%