Enhancing cybersecurity situation awareness through visualization: A USB data exfiltration case study
Employees who have legitimate access to an organization's data may occasionally put sensitive corporate data at risk, either carelessly or maliciously. Ideally, potential breaches should be detected as soon as they occur, but in practice there may be delays, because human analysts are not able...
Main Authors: | Mu-Huan (Miles) Chung, Yuhong (Alisha) Yang, Lu Wang, Greg Cento, Khilan Jerath, Parwinder Taank, Abhay Raman, Jonathan H. Chan, Mark H. Chignell |
---|---|
Format: | Article |
Language: | English |
Published: |
Elsevier
2023-01-01
|
Series: | Heliyon |
Subjects: | |
Online Access: | http://www.sciencedirect.com/science/article/pii/S2405844023002323 |
Similar Items
-
Data Exfiltration Detection on Network Metadata with Autoencoders
by: Daan Willems, et al.
Published: (2023-06-01) -
DNS Tunnelling, Exfiltration and Detection over Cloud Environments
by: Lehel Salat, et al.
Published: (2023-03-01) -
Data Exfiltration through Electromagnetic Covert Channel of Wired Industrial Control Systems
by: Shakthi Sachintha, et al.
Published: (2023-02-01) -
Text analysis of DNS queries for data exfiltration protection of computer networks
by: Ya. V. Bubnov, et al.
Published: (2020-09-01) -
Analysis of some case studies on cyberattacks and proposed methods for preventing them
by: Daniel Mihai LEU, et al.
Published: (2023-06-01)