Security information and event management tools and insider threat detection

Approved for public release; distribution is unlimited === Malicious insider activities on military networks can pose a threat to military operations. Early identification of malicious insiders assists in preventing significant damage and reduces the overall insider threat to military networks. Secu...

Full description

Bibliographic Details
Main Author: Callahan, Christopher J.
Other Authors: Fulp, J.D.
Published: Monterey, California: Naval Postgraduate School 2013
Online Access:http://hdl.handle.net/10945/37596
id ndltd-nps.edu-oai-calhoun.nps.edu-10945-37596
record_format oai_dc
spelling ndltd-nps.edu-oai-calhoun.nps.edu-10945-375962014-11-27T16:19:06Z Security information and event management tools and insider threat detection Callahan, Christopher J. Fulp, J.D. Krautheim, Frank Cyber Academic Group Approved for public release; distribution is unlimited Malicious insider activities on military networks can pose a threat to military operations. Early identification of malicious insiders assists in preventing significant damage and reduces the overall insider threat to military networks. Security Information and Event Management (SIEM) tools can be used to identify potential malicious insider activities. SIEM tools provide the ability to normalize and correlate log data from multiple sources on networks. Personnel background investigations and administrative action information can provide data sources for SIEM tools in order to assist in early identification of the insider threat by correlating this information with the individuals online activities. This thesis provides background information on the components and functionality of SIEM tools, summarizes historic insider threat cases to determine common motivations, provides an overview of military security investigations and administrative actions in order to determine candidate sources for SIEM correlation, and provides an overview of common methods of data exfiltration by malicious insiders. This information is then used to develop an example SIEM architecture that highlights how the military can use a SIEM to identify and prevent potential internal insider threats by correlating an individuals network activities with background investigation and administrative action information. 2013-11-20T23:35:57Z 2013-11-20T23:35:57Z 2013-09 Thesis http://hdl.handle.net/10945/37596 This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. As such, it is in the public domain, and under the provisions of Title 17, United States Code, Section 105, it may not be copyrighted. Monterey, California: Naval Postgraduate School
collection NDLTD
sources NDLTD
description Approved for public release; distribution is unlimited === Malicious insider activities on military networks can pose a threat to military operations. Early identification of malicious insiders assists in preventing significant damage and reduces the overall insider threat to military networks. Security Information and Event Management (SIEM) tools can be used to identify potential malicious insider activities. SIEM tools provide the ability to normalize and correlate log data from multiple sources on networks. Personnel background investigations and administrative action information can provide data sources for SIEM tools in order to assist in early identification of the insider threat by correlating this information with the individuals online activities. This thesis provides background information on the components and functionality of SIEM tools, summarizes historic insider threat cases to determine common motivations, provides an overview of military security investigations and administrative actions in order to determine candidate sources for SIEM correlation, and provides an overview of common methods of data exfiltration by malicious insiders. This information is then used to develop an example SIEM architecture that highlights how the military can use a SIEM to identify and prevent potential internal insider threats by correlating an individuals network activities with background investigation and administrative action information.
author2 Fulp, J.D.
author_facet Fulp, J.D.
Callahan, Christopher J.
author Callahan, Christopher J.
spellingShingle Callahan, Christopher J.
Security information and event management tools and insider threat detection
author_sort Callahan, Christopher J.
title Security information and event management tools and insider threat detection
title_short Security information and event management tools and insider threat detection
title_full Security information and event management tools and insider threat detection
title_fullStr Security information and event management tools and insider threat detection
title_full_unstemmed Security information and event management tools and insider threat detection
title_sort security information and event management tools and insider threat detection
publisher Monterey, California: Naval Postgraduate School
publishDate 2013
url http://hdl.handle.net/10945/37596
work_keys_str_mv AT callahanchristopherj securityinformationandeventmanagementtoolsandinsiderthreatdetection
_version_ 1716725503711248384