Abstract
Military secrets or confidential data of any organization are extremely important assets. They must be discluded from outside. To do this, methods for detecting anomalous attacks and intrusions inside the network have been proposed. However, most anomaly-detection methods only cover aspects of intrusion from outside and do not deal with internal leakage of data, inflicting greater damage than intrusions and attacks from outside. In addition, applying conventional anomaly-detection methods to data exfiltration creates many problems, because the methods do not consider a number of variables or the internal network environment. In this paper, we describe issues considered in data exfiltration detection for anomaly detection (DEDfAD) to improve the accuracy of the methods, classify the methods as profile-based detection or machine learning-based detection, and analyze their advantages and disadvantages. We also suggest future research challenges through comparative analysis of the issues with classification of the detection methods. PU - The Korea Academia-Industrial cooperation Society
Cite
CITATION STYLE
Lim, W., Kwon, K., Kim, J.-J., Lee, J.-E., & Cha, S.-H. (2016). Comparison and Analysis of Anomaly Detection Methods for Detecting Data Exfiltration. Journal of the Korea Academia-Industrial Cooperation Society, 17(9), 440–446. https://doi.org/10.5762/kais.2016.17.9.440
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.