dc.contributor.advisor |
Jutla, Dawn |
|
dc.contributor.advisor |
Wang, Hai, 1973- |
|
dc.creator |
Ye, Binbin |
|
dc.date.accessioned |
2013-05-09T13:45:48Z |
|
dc.date.available |
2013-05-09T13:45:48Z |
|
dc.date.issued |
2013 |
|
dc.identifier.other |
QA76.9 A25 Y4 2013 |
|
dc.identifier.uri |
http://library2.smu.ca/xmlui/handle/01/24925 |
|
dc.description |
viii, 97 leaves : ill. ; 29 cm. |
|
dc.description |
Includes abstract. |
|
dc.description |
Includes bibliographical references (leaves 88-97). |
|
dc.description.abstract |
An intrusion detection system generally detects unwanted manipulations to computer systems. In recent years, this technology has been used to protect personal information after it has been collected by an organization. Selecting an appropriate IDS is an important decision for system security administrators, to keep authorized employees from abusing their access to the system to exploit sensitive information. To date, little work has been done to create a benchmark for small and mid-size organizations to measure and compare the capability of different insider threat IDSs which are based on user profiling. It motivates us to create a benchmark which enables organizations to compare these different IDSs. The benchmark is used to produce useful comparisons of the accuracy and overhead of two key research implementations of future insider threat intrusion algorithms, which are based on user behavior. |
en_CA |
dc.description.provenance |
Submitted by Trish Grelot (trish.grelot@smu.ca) on 2013-05-09T13:45:48Z
No. of bitstreams: 1
ye_binbin_masters_2013.pdf: 1701840 bytes, checksum: b4c82ca181f012b5e9ca85096fe80d18 (MD5) |
en |
dc.description.provenance |
Made available in DSpace on 2013-05-09T13:45:48Z (GMT). No. of bitstreams: 1
ye_binbin_masters_2013.pdf: 1701840 bytes, checksum: b4c82ca181f012b5e9ca85096fe80d18 (MD5) |
en |
dc.language.iso |
en |
en_CA |
dc.publisher |
Halifax, N.S. : Saint Mary's University |
|
dc.subject.lcc |
QA76.9.A25 |
|
dc.subject.lcsh |
Intrusion detection systems (Computer security) -- Evaluation |
|
dc.subject.lcsh |
Employee crimes -- Prevention |
|
dc.subject.lcsh |
Computer crimes -- Prevention |
|
dc.title |
Benchmarking insider threat intrusion detection systems |
en_CA |
dc.type |
Text |
en_CA |
thesis.degree.name |
Master of Science in Applied Science |
|
thesis.degree.level |
Masters |
|
thesis.degree.discipline |
Finance, Information Systems, & Management Science |
|
thesis.degree.grantor |
Saint Mary's University (Halifax, N.S.) |
|