The possibility for theft or misuse of legitimate user credentials is a potential cyber-security weakness in any enterprise computer network which is almost impossible to eradicate. However, by monitoring the network traffic patterns, it can be possible to detect misuse of credentials. This article presents an initial investigation into deconvolving the mixture behaviour of several individuals within a network, to see if individual users can be identified. Towards that, a technique used for document classification is deployed, the Latent Dirichlet allocation model. A pilot study is conducted on authentication events taken from real data from the enterprise network of Los Alamos National Laboratory
In modern computer networks, administrators have limited control over physical security of the netwo...
Background. Security Information and Event Management (SIEM) systems today are sophisticated sets of...
Companies commonly provide work related devices enabled with Internet connection to their employees....
The possibility for theft or misuse of legitimate user credentials is a potential cyber-security wea...
Abstract—Authentication using centralized methods is a primary trust mechanism within most large-sca...
Statistical anomaly detection techniques provide the next layer of cyber-security defences below tra...
In this information age, networks are increasingly important. At many points in network routing, pas...
Heightened interest and increased accessibility to computer systems have presented new threats to co...
Communicating parties inside computer networks use different kind of identifiers. Some of these iden...
Secure remote access is integral to the workflow of virtually every enterprise today. It is also an...
One of the biggest reasons that lead to violations of the security of companies’ services is obtaini...
The growing demand for processing and storage capabilities has led to the deployment of high-perform...
Abstract:- This paper describes an effort to provide a holistic view of network conversation exchang...
With an increasingly digitally connected society comes complexity, uncertainty, and risk. Network mo...
Basic concepts and classification. It depends on each entity registered in the computer system (user...
In modern computer networks, administrators have limited control over physical security of the netwo...
Background. Security Information and Event Management (SIEM) systems today are sophisticated sets of...
Companies commonly provide work related devices enabled with Internet connection to their employees....
The possibility for theft or misuse of legitimate user credentials is a potential cyber-security wea...
Abstract—Authentication using centralized methods is a primary trust mechanism within most large-sca...
Statistical anomaly detection techniques provide the next layer of cyber-security defences below tra...
In this information age, networks are increasingly important. At many points in network routing, pas...
Heightened interest and increased accessibility to computer systems have presented new threats to co...
Communicating parties inside computer networks use different kind of identifiers. Some of these iden...
Secure remote access is integral to the workflow of virtually every enterprise today. It is also an...
One of the biggest reasons that lead to violations of the security of companies’ services is obtaini...
The growing demand for processing and storage capabilities has led to the deployment of high-perform...
Abstract:- This paper describes an effort to provide a holistic view of network conversation exchang...
With an increasingly digitally connected society comes complexity, uncertainty, and risk. Network mo...
Basic concepts and classification. It depends on each entity registered in the computer system (user...
In modern computer networks, administrators have limited control over physical security of the netwo...
Background. Security Information and Event Management (SIEM) systems today are sophisticated sets of...
Companies commonly provide work related devices enabled with Internet connection to their employees....