Näytä suppeat kuvailutiedot

Detecting Insider Threats Using User and Entity Behavior Analytics

Hakonen, Petri (2022)

dc.contributor.authorHakonen, Petri
dc.date.accessioned2022-12-09T13:23:13Z
dc.date.available2022-12-09T13:23:13Z
dc.date.issued2022-
dc.identifier.urihttp://www.theseus.fi/handle/10024/786079
dc.description.abstractInformation technology advancements made during the past decade have made detecting adversaries extremely hard and almost impossible, so detection mechanisms have also evolved from old signature-based systems to look at the behavior of users, entities, and software. The purpose of this master’s thesis is to research and gather the basic knowledge of insider threat taxonomy, what are the common indicators in human behavior, how those indicators could be potentially detected via technical logs (machine data) with user and entity behavior analytics tools and what are the prioritized use cases. In my master’s thesis process I utilized a mixed method approach of research. Background information was gathered through literature review, interview and familiarizing myself with the use cases of User and Entity Behavior analytics tool developed by Splunk Inc. The findings of my research indicate that traditional security methods relying on rules and known patterns are not going to disappear, but they will remain as a key part of the layered defense. The effectiveness of these solutions will be multiplied by adapting AI driven user behavior analytics on top of them. User behavior analytics tools are providing a different approach to anomaly detection and relying on a range of analytical approaches. These are usually a combination of basic analytics methods and advanced analytics. Basic analytics means simple statistics, signatures, and pattern matching. Advanced analytics are relying in AI capabilities, and this allows the tool to learn and adapt faster to changes and does not require a similar level of human intervention. The changes are seen as anomalies from usual behavior, whether it is based on learning from individual behavior over times or from predefined role-based baselines.-
dc.language.isoeng-
dc.rightsfi=All rights reserved. This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.|sv=All rights reserved. This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.|en=All rights reserved. This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.|-
dc.titleDetecting Insider Threats Using User and Entity Behavior Analytics-
dc.type.ontasotfi=Ylempi AMK-opinnäytetyö|sv=Högre YH-examensarbete|en=Master's thesis|-
dc.identifier.urnURN:NBN:fi:amk-2022120226009-
dc.subject.specializationCyber Security-
dc.subject.degreeprogramfi=Tieto- ja viestintätekniikka|sv=Informations- och kommunikationsteknik|en=Information and Communications Technology|-
dc.subject.ysocyber security-
dc.subject.disciplineDegree Programme in Information and Communications Technology-
annif.suggestions.linkshttp://www.yso.fi/onto/yso/p5462|http://www.yso.fi/onto/yso/p6851|http://www.yso.fi/onto/yso/p27250|http://www.yso.fi/onto/yso/p13302|http://www.yso.fi/onto/yso/p7940|http://www.yso.fi/onto/yso/p2407|http://www.yso.fi/onto/yso/p20743|http://www.yso.fi/onto/yso/p183|http://www.yso.fi/onto/yso/p105078|http://www.yso.fi/onto/yso/p3975fi


Tiedostot

Thumbnail

Viite kuuluu kokoelmiin:

Näytä suppeat kuvailutiedot