Back to Search Start Over

Security Information and Event Management Tools and Insider Threat Detection

Authors :
NAVAL POSTGRADUATE SCHOOL MONTEREY CA
Callahan, Christopher J
NAVAL POSTGRADUATE SCHOOL MONTEREY CA
Callahan, Christopher J
Source :
DTIC
Publication Year :
2013

Abstract

Malicious insider activities on military networks can pose a threat to military operations. Early identification of malicious insiders assists in preventing significant damage and reduces the overall insider threat to military networks. Security Information and Event Management (SIEM) tools can be used to identify potential malicious insider activities. SIEM tools provide the ability to normalize and correlate log data from multiple sources on networks. Personnel background investigations and administrative action information can provide data sources for SIEM tools in order to assist in early identification of the insider threat by correlating this information with the individual s online activities. This thesis provides background information on the components and functionality of SIEM tools, summarizes historic insider threat cases to determine common motivations, provides an overview of military security investigations and administrative actions in order to determine candidate sources for SIEM correlation, and provides an overview of common methods of data exfiltration by malicious insiders. This information is then used to develop an example SIEM architecture that highlights how the military can use a SIEM to identify and prevent potential internal insider threats by correlating an individual s network activities with background investigation and administrative action information.

Details

Database :
OAIster
Journal :
DTIC
Notes :
text/html, English
Publication Type :
Electronic Resource
Accession number :
edsoai.ocn872739799
Document Type :
Electronic Resource