Security information and event management tools and insider threat detection
Approved for public release; distribution is unlimited === Malicious insider activities on military networks can pose a threat to military operations. Early identification of malicious insiders assists in preventing significant damage and reduces the overall insider threat to military networks. Secu...
Main Author: | |
---|---|
Other Authors: | |
Published: |
Monterey, California: Naval Postgraduate School
2013
|
Online Access: | http://hdl.handle.net/10945/37596 |
id |
ndltd-nps.edu-oai-calhoun.nps.edu-10945-37596 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-nps.edu-oai-calhoun.nps.edu-10945-375962014-11-27T16:19:06Z Security information and event management tools and insider threat detection Callahan, Christopher J. Fulp, J.D. Krautheim, Frank Cyber Academic Group Approved for public release; distribution is unlimited Malicious insider activities on military networks can pose a threat to military operations. Early identification of malicious insiders assists in preventing significant damage and reduces the overall insider threat to military networks. Security Information and Event Management (SIEM) tools can be used to identify potential malicious insider activities. SIEM tools provide the ability to normalize and correlate log data from multiple sources on networks. Personnel background investigations and administrative action information can provide data sources for SIEM tools in order to assist in early identification of the insider threat by correlating this information with the individuals online activities. This thesis provides background information on the components and functionality of SIEM tools, summarizes historic insider threat cases to determine common motivations, provides an overview of military security investigations and administrative actions in order to determine candidate sources for SIEM correlation, and provides an overview of common methods of data exfiltration by malicious insiders. This information is then used to develop an example SIEM architecture that highlights how the military can use a SIEM to identify and prevent potential internal insider threats by correlating an individuals network activities with background investigation and administrative action information. 2013-11-20T23:35:57Z 2013-11-20T23:35:57Z 2013-09 Thesis http://hdl.handle.net/10945/37596 This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. As such, it is in the public domain, and under the provisions of Title 17, United States Code, Section 105, it may not be copyrighted. Monterey, California: Naval Postgraduate School |
collection |
NDLTD |
sources |
NDLTD |
description |
Approved for public release; distribution is unlimited === Malicious insider activities on military networks can pose a threat to military operations. Early identification of malicious insiders assists in preventing significant damage and reduces the overall insider threat to military networks. Security Information and Event Management (SIEM) tools can be used to identify potential malicious insider activities. SIEM tools provide the ability to normalize and correlate log data from multiple sources on networks. Personnel background investigations and administrative action information can provide data sources for SIEM tools in order to assist in early identification of the insider threat by correlating this information with the individuals online activities. This thesis provides background information on the components and functionality of SIEM tools, summarizes historic insider threat cases to determine common motivations, provides an overview of military security investigations and administrative actions in order to determine candidate sources for SIEM correlation, and provides an overview of common methods of data exfiltration by malicious insiders. This information is then used to develop an example SIEM architecture that highlights how the military can use a SIEM to identify and prevent potential internal insider threats by correlating an individuals network activities with background investigation and administrative action information. |
author2 |
Fulp, J.D. |
author_facet |
Fulp, J.D. Callahan, Christopher J. |
author |
Callahan, Christopher J. |
spellingShingle |
Callahan, Christopher J. Security information and event management tools and insider threat detection |
author_sort |
Callahan, Christopher J. |
title |
Security information and event management tools and insider threat detection |
title_short |
Security information and event management tools and insider threat detection |
title_full |
Security information and event management tools and insider threat detection |
title_fullStr |
Security information and event management tools and insider threat detection |
title_full_unstemmed |
Security information and event management tools and insider threat detection |
title_sort |
security information and event management tools and insider threat detection |
publisher |
Monterey, California: Naval Postgraduate School |
publishDate |
2013 |
url |
http://hdl.handle.net/10945/37596 |
work_keys_str_mv |
AT callahanchristopherj securityinformationandeventmanagementtoolsandinsiderthreatdetection |
_version_ |
1716725503711248384 |