Profiler-2000: Attacking the Insider Threat
The Profiler project was concerned with fundamental theoretical and measurement issues in the field of anomaly/intrusion detection, particularly as directed at the problem of insiders. Major issues addressed were: scientifically sound foundations for divers anomaly detectors; tools and methods for a...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Report |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Maxion, R A Tan, K M Killourhy, S S Townsend, T N |
description | The Profiler project was concerned with fundamental theoretical and measurement issues in the field of anomaly/intrusion detection, particularly as directed at the problem of insiders. Major issues addressed were: scientifically sound foundations for divers anomaly detectors; tools and methods for assessment of detector effectiveness; and controlled benchmark data sets for testing. Major accomplishments of the project were: determining how the interaction between the architectural aspects of a detection algorithm, such as detection mechanism and coverage, can result in unanticipated vulnerabilities that allow an adversary to undermine the detector; production of calibrated test data sets; and rigorous assessment and error analysis of an anomaly detector in an insider-threat environment.
The original document contains color images. |
format | Report |
fullrecord | <record><control><sourceid>dtic_1RU</sourceid><recordid>TN_cdi_dtic_stinet_ADA439600</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>ADA439600</sourcerecordid><originalsourceid>FETCH-dtic_stinet_ADA4396003</originalsourceid><addsrcrecordid>eNrjZNAOKMpPy8xJLdI1MjAwsFJwLClJTM7OzEtXKMlIVfDMK85MSS1SCMkoSk0s4WFgTUvMKU7lhdLcDDJuriHOHropJZnJ8cUlmXmpJfGOLo4mxpZmBgbGBKQBOfAlMw</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>report</recordtype></control><display><type>report</type><title>Profiler-2000: Attacking the Insider Threat</title><source>DTIC Technical Reports</source><creator>Maxion, R A ; Tan, K M ; Killourhy, S S ; Townsend, T N</creator><creatorcontrib>Maxion, R A ; Tan, K M ; Killourhy, S S ; Townsend, T N ; CARNEGIE-MELLON UNIV PITTSBURGH PA</creatorcontrib><description>The Profiler project was concerned with fundamental theoretical and measurement issues in the field of anomaly/intrusion detection, particularly as directed at the problem of insiders. Major issues addressed were: scientifically sound foundations for divers anomaly detectors; tools and methods for assessment of detector effectiveness; and controlled benchmark data sets for testing. Major accomplishments of the project were: determining how the interaction between the architectural aspects of a detection algorithm, such as detection mechanism and coverage, can result in unanticipated vulnerabilities that allow an adversary to undermine the detector; production of calibrated test data sets; and rigorous assessment and error analysis of an anomaly detector in an insider-threat environment.
The original document contains color images.</description><language>eng</language><subject>ADVERSARIES ; ALGORITHMS ; ANOMALIES ; ANOMALY DETECTION ; BENCHMARKS ; CALIBRATION ; COMPUTER ARCHITECTURE ; Computer Systems Management and Standards ; DATA BASES ; DATA PROCESSING SECURITY ; DETECTION ALGORITHMS ; ERROR ANALYSIS ; EXPERIMENTAL DATA ; INSIDER THREATS ; INTRUSION DETECTION ; INTRUSION DETECTORS ; Miscellaneous Detection and Detectors ; PE62301E ; PROFILER PROJECT ; PROFILING ; THREATS ; WUAFRLIAST0006</subject><creationdate>2005</creationdate><rights>Approved for public release; distribution is unlimited. This document is not available from DTIC in microfiche.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>230,776,881,27544,27545</link.rule.ids><linktorsrc>$$Uhttps://apps.dtic.mil/sti/citations/ADA439600$$EView_record_in_DTIC$$FView_record_in_$$GDTIC$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Maxion, R A</creatorcontrib><creatorcontrib>Tan, K M</creatorcontrib><creatorcontrib>Killourhy, S S</creatorcontrib><creatorcontrib>Townsend, T N</creatorcontrib><creatorcontrib>CARNEGIE-MELLON UNIV PITTSBURGH PA</creatorcontrib><title>Profiler-2000: Attacking the Insider Threat</title><description>The Profiler project was concerned with fundamental theoretical and measurement issues in the field of anomaly/intrusion detection, particularly as directed at the problem of insiders. Major issues addressed were: scientifically sound foundations for divers anomaly detectors; tools and methods for assessment of detector effectiveness; and controlled benchmark data sets for testing. Major accomplishments of the project were: determining how the interaction between the architectural aspects of a detection algorithm, such as detection mechanism and coverage, can result in unanticipated vulnerabilities that allow an adversary to undermine the detector; production of calibrated test data sets; and rigorous assessment and error analysis of an anomaly detector in an insider-threat environment.
The original document contains color images.</description><subject>ADVERSARIES</subject><subject>ALGORITHMS</subject><subject>ANOMALIES</subject><subject>ANOMALY DETECTION</subject><subject>BENCHMARKS</subject><subject>CALIBRATION</subject><subject>COMPUTER ARCHITECTURE</subject><subject>Computer Systems Management and Standards</subject><subject>DATA BASES</subject><subject>DATA PROCESSING SECURITY</subject><subject>DETECTION ALGORITHMS</subject><subject>ERROR ANALYSIS</subject><subject>EXPERIMENTAL DATA</subject><subject>INSIDER THREATS</subject><subject>INTRUSION DETECTION</subject><subject>INTRUSION DETECTORS</subject><subject>Miscellaneous Detection and Detectors</subject><subject>PE62301E</subject><subject>PROFILER PROJECT</subject><subject>PROFILING</subject><subject>THREATS</subject><subject>WUAFRLIAST0006</subject><fulltext>true</fulltext><rsrctype>report</rsrctype><creationdate>2005</creationdate><recordtype>report</recordtype><sourceid>1RU</sourceid><recordid>eNrjZNAOKMpPy8xJLdI1MjAwsFJwLClJTM7OzEtXKMlIVfDMK85MSS1SCMkoSk0s4WFgTUvMKU7lhdLcDDJuriHOHropJZnJ8cUlmXmpJfGOLo4mxpZmBgbGBKQBOfAlMw</recordid><startdate>200509</startdate><enddate>200509</enddate><creator>Maxion, R A</creator><creator>Tan, K M</creator><creator>Killourhy, S S</creator><creator>Townsend, T N</creator><scope>1RU</scope><scope>BHM</scope></search><sort><creationdate>200509</creationdate><title>Profiler-2000: Attacking the Insider Threat</title><author>Maxion, R A ; Tan, K M ; Killourhy, S S ; Townsend, T N</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-dtic_stinet_ADA4396003</frbrgroupid><rsrctype>reports</rsrctype><prefilter>reports</prefilter><language>eng</language><creationdate>2005</creationdate><topic>ADVERSARIES</topic><topic>ALGORITHMS</topic><topic>ANOMALIES</topic><topic>ANOMALY DETECTION</topic><topic>BENCHMARKS</topic><topic>CALIBRATION</topic><topic>COMPUTER ARCHITECTURE</topic><topic>Computer Systems Management and Standards</topic><topic>DATA BASES</topic><topic>DATA PROCESSING SECURITY</topic><topic>DETECTION ALGORITHMS</topic><topic>ERROR ANALYSIS</topic><topic>EXPERIMENTAL DATA</topic><topic>INSIDER THREATS</topic><topic>INTRUSION DETECTION</topic><topic>INTRUSION DETECTORS</topic><topic>Miscellaneous Detection and Detectors</topic><topic>PE62301E</topic><topic>PROFILER PROJECT</topic><topic>PROFILING</topic><topic>THREATS</topic><topic>WUAFRLIAST0006</topic><toplevel>online_resources</toplevel><creatorcontrib>Maxion, R A</creatorcontrib><creatorcontrib>Tan, K M</creatorcontrib><creatorcontrib>Killourhy, S S</creatorcontrib><creatorcontrib>Townsend, T N</creatorcontrib><creatorcontrib>CARNEGIE-MELLON UNIV PITTSBURGH PA</creatorcontrib><collection>DTIC Technical Reports</collection><collection>DTIC STINET</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Maxion, R A</au><au>Tan, K M</au><au>Killourhy, S S</au><au>Townsend, T N</au><aucorp>CARNEGIE-MELLON UNIV PITTSBURGH PA</aucorp><format>book</format><genre>unknown</genre><ristype>RPRT</ristype><btitle>Profiler-2000: Attacking the Insider Threat</btitle><date>2005-09</date><risdate>2005</risdate><abstract>The Profiler project was concerned with fundamental theoretical and measurement issues in the field of anomaly/intrusion detection, particularly as directed at the problem of insiders. Major issues addressed were: scientifically sound foundations for divers anomaly detectors; tools and methods for assessment of detector effectiveness; and controlled benchmark data sets for testing. Major accomplishments of the project were: determining how the interaction between the architectural aspects of a detection algorithm, such as detection mechanism and coverage, can result in unanticipated vulnerabilities that allow an adversary to undermine the detector; production of calibrated test data sets; and rigorous assessment and error analysis of an anomaly detector in an insider-threat environment.
The original document contains color images.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_dtic_stinet_ADA439600 |
source | DTIC Technical Reports |
subjects | ADVERSARIES ALGORITHMS ANOMALIES ANOMALY DETECTION BENCHMARKS CALIBRATION COMPUTER ARCHITECTURE Computer Systems Management and Standards DATA BASES DATA PROCESSING SECURITY DETECTION ALGORITHMS ERROR ANALYSIS EXPERIMENTAL DATA INSIDER THREATS INTRUSION DETECTION INTRUSION DETECTORS Miscellaneous Detection and Detectors PE62301E PROFILER PROJECT PROFILING THREATS WUAFRLIAST0006 |
title | Profiler-2000: Attacking the Insider Threat |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-29T10%3A04%3A24IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-dtic_1RU&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=unknown&rft.btitle=Profiler-2000:%20Attacking%20the%20Insider%20Threat&rft.au=Maxion,%20R%20A&rft.aucorp=CARNEGIE-MELLON%20UNIV%20PITTSBURGH%20PA&rft.date=2005-09&rft_id=info:doi/&rft_dat=%3Cdtic_1RU%3EADA439600%3C/dtic_1RU%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |