acm-header
Sign In

Communications of the ACM

ACM TechNews

Spotting Insider Threats on the Front Lines


View as: Print Mobile App Share:
U.S. Military Academy at West Point

U.S. Military Academy at West Point

Courtesy of West Point

U.S. Military Academy at West Point cadets are researching ways of using network monitoring tools to automate frontline security.

The cadets are using a simulated forward operating environment to survey Army combat veterans to identify the behavior characteristics that distinguish between normal and malicious behavior from network insiders. The technology is needed as the military increasingly depends on networked computing systems for real-time information and communications during combat.

The cadets are working with an appliance-based tool that uses a software agent on the client to monitor end-user activity and to define acceptable behavior. The system can send alerts to officials and block activities that violate policy. The tool's automation enables it to function in a rapidly fluctuating environment, but it relies on policies to tell it what to respond to instead of using intelligence to detect conspicuous behavior. The cadets are working with algorithms that the tool can employ to recognize suspicious behavior.

From Government Computer News
View Full Article

Abstracts Copyright © 2011 Information Inc. External Link, Bethesda, Maryland, USA


 

No entries found

Sign In for Full Access
» Forgot Password? » Create an ACM Web Account