An Empirical Study on the Instant Analysis System of Privileged Account Login Behavior
碩士 === 國立中央大學 === 資訊管理學系在職專班 === 106 === Abstract With the rise in popularity of the Internet, the events of cyber attacks have also emerged endlessly, causing troubles and fears of society, enterprise organizations and the public. The continually evolving attack methods have also caused the losses...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2018
|
Online Access: | http://ndltd.ncl.edu.tw/handle/xstub2 |
id |
ndltd-TW-106NCU05396071 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-106NCU053960712019-10-31T05:22:24Z http://ndltd.ncl.edu.tw/handle/xstub2 An Empirical Study on the Instant Analysis System of Privileged Account Login Behavior 特權帳號登入行為即時分析系統之實證研究 Chia-Liang Pan 潘嘉良 碩士 國立中央大學 資訊管理學系在職專班 106 Abstract With the rise in popularity of the Internet, the events of cyber attacks have also emerged endlessly, causing troubles and fears of society, enterprise organizations and the public. The continually evolving attack methods have also caused the losses of the organization to become more serious. However, many intrusions are related to privileged account management. If a privileged account is stolen, it is likely to cause internal threats to the organization. Therefore, proper management of privileged accounts is necessary. It is also need to monitor the usage behavior of their privileged accounts to avoid damage to the organization caused by abnormal use. This study is based on an organization's privileged account management mechanism. It strengthens its "privileged account management" operation mode and combines the functions of the " security information and event management (SIEM) " records and logs management and instant alarms to explore how to through the system integration to establish a mechanism for effective monitoring and real-time analysis of various privileged account login behaviors, and have an automatic alert function. When an abnormal login behavior occurs, the privileged account administrator can be notified immediately, so that the administrator can grasp the situation and take countermeasures in the first time to avoid or reduce the harm of the intrusion to the organization. Through the common privileged account login success behavior type, the correlation rules of twelve patterns are developed, which can be used by SIEM as the aforementioned abnormal behavior check in this study. It has been tested and verified that these twelve correlation rules can instantly detect abnormal login behavior of privileged accounts, so the application to enterprise organizations will strengthen their immediate defense capabilities. When an organization encounters information security attacks, it can achieve early detection through the instant monitoring mechanism of this research, and quickly respond to significantly reduce losses and injuries. Shi-Jen Lin 林熙禎 2018 學位論文 ; thesis 101 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立中央大學 === 資訊管理學系在職專班 === 106 === Abstract
With the rise in popularity of the Internet, the events of cyber attacks have also emerged endlessly, causing troubles and fears of society, enterprise organizations and the public. The continually evolving attack methods have also caused the losses of the organization to become more serious. However, many intrusions are related to privileged account management. If a privileged account is stolen, it is likely to cause internal threats to the organization. Therefore, proper management of privileged accounts is necessary. It is also need to monitor the usage behavior of their privileged accounts to avoid damage to the organization caused by abnormal use.
This study is based on an organization's privileged account management mechanism. It strengthens its "privileged account management" operation mode and combines the functions of the " security information and event management (SIEM) " records and logs management and instant alarms to explore how to through the system integration to establish a mechanism for effective monitoring and real-time analysis of various privileged account login behaviors, and have an automatic alert function. When an abnormal login behavior occurs, the privileged account administrator can be notified immediately, so that the administrator can grasp the situation and take countermeasures in the first time to avoid or reduce the harm of the intrusion to the organization.
Through the common privileged account login success behavior type, the correlation rules of twelve patterns are developed, which can be used by SIEM as the aforementioned abnormal behavior check in this study. It has been tested and verified that these twelve correlation rules can instantly detect abnormal login behavior of privileged accounts, so the application to enterprise organizations will strengthen their immediate defense capabilities. When an organization encounters information security attacks, it can achieve early detection through the instant monitoring mechanism of this research, and quickly respond to significantly reduce losses and injuries.
|
author2 |
Shi-Jen Lin |
author_facet |
Shi-Jen Lin Chia-Liang Pan 潘嘉良 |
author |
Chia-Liang Pan 潘嘉良 |
spellingShingle |
Chia-Liang Pan 潘嘉良 An Empirical Study on the Instant Analysis System of Privileged Account Login Behavior |
author_sort |
Chia-Liang Pan |
title |
An Empirical Study on the Instant Analysis System of Privileged Account Login Behavior |
title_short |
An Empirical Study on the Instant Analysis System of Privileged Account Login Behavior |
title_full |
An Empirical Study on the Instant Analysis System of Privileged Account Login Behavior |
title_fullStr |
An Empirical Study on the Instant Analysis System of Privileged Account Login Behavior |
title_full_unstemmed |
An Empirical Study on the Instant Analysis System of Privileged Account Login Behavior |
title_sort |
empirical study on the instant analysis system of privileged account login behavior |
publishDate |
2018 |
url |
http://ndltd.ncl.edu.tw/handle/xstub2 |
work_keys_str_mv |
AT chialiangpan anempiricalstudyontheinstantanalysissystemofprivilegedaccountloginbehavior AT pānjiāliáng anempiricalstudyontheinstantanalysissystemofprivilegedaccountloginbehavior AT chialiangpan tèquánzhànghàodēngrùxíngwèijíshífēnxīxìtǒngzhīshízhèngyánjiū AT pānjiāliáng tèquánzhànghàodēngrùxíngwèijíshífēnxīxìtǒngzhīshízhèngyánjiū AT chialiangpan empiricalstudyontheinstantanalysissystemofprivilegedaccountloginbehavior AT pānjiāliáng empiricalstudyontheinstantanalysissystemofprivilegedaccountloginbehavior |
_version_ |
1719284384396214272 |