dc.contributor.author | Hakonen, Petri | |
dc.date.accessioned | 2022-12-09T13:23:13Z | |
dc.date.available | 2022-12-09T13:23:13Z | |
dc.date.issued | 2022 | - |
dc.identifier.uri | http://www.theseus.fi/handle/10024/786079 | |
dc.description.abstract | Information technology advancements made during the past decade have made detecting adversaries extremely hard and almost impossible, so detection mechanisms have also evolved from old signature-based systems to look at the behavior of users, entities, and software.
The purpose of this master’s thesis is to research and gather the basic knowledge of insider threat taxonomy, what are the common indicators in human behavior, how those indicators could be potentially detected via technical logs (machine data) with user and entity behavior analytics tools and what are the prioritized use cases. In my master’s thesis process I utilized a mixed method approach of research. Background information was gathered through literature review, interview and familiarizing myself with the use cases of User and Entity Behavior analytics tool developed by Splunk Inc.
The findings of my research indicate that traditional security methods relying on rules and known patterns are not going to disappear, but they will remain as a key part of the layered defense. The effectiveness of these solutions will be multiplied by adapting AI driven user behavior analytics on top of them. User behavior analytics tools are providing a different approach to anomaly detection and relying on a range of analytical approaches. These are usually a combination of basic analytics methods and advanced analytics. Basic analytics means simple statistics, signatures, and pattern matching. Advanced analytics are relying in AI capabilities, and this allows the tool to learn and adapt faster to changes and does not require a similar level of human intervention. The changes are seen as anomalies from usual behavior, whether it is based on learning from individual behavior over times or from predefined role-based baselines. | - |
dc.language.iso | eng | - |
dc.rights | fi=All rights reserved. This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.|sv=All rights reserved. This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.|en=All rights reserved. This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.| | - |
dc.title | Detecting Insider Threats Using User and Entity Behavior Analytics | - |
dc.type.ontasot | fi=Ylempi AMK-opinnäytetyö|sv=Högre YH-examensarbete|en=Master's thesis| | - |
dc.identifier.urn | URN:NBN:fi:amk-2022120226009 | - |
dc.subject.specialization | Cyber Security | - |
dc.subject.degreeprogram | fi=Tieto- ja viestintätekniikka|sv=Informations- och kommunikationsteknik|en=Information and Communications Technology| | - |
dc.subject.yso | cyber security | - |
dc.subject.discipline | Degree Programme in Information and Communications Technology | - |
annif.suggestions.links | http://www.yso.fi/onto/yso/p5462|http://www.yso.fi/onto/yso/p6851|http://www.yso.fi/onto/yso/p27250|http://www.yso.fi/onto/yso/p13302|http://www.yso.fi/onto/yso/p7940|http://www.yso.fi/onto/yso/p2407|http://www.yso.fi/onto/yso/p20743|http://www.yso.fi/onto/yso/p183|http://www.yso.fi/onto/yso/p105078|http://www.yso.fi/onto/yso/p3975 | fi |