OS independent and hardware-assisted insider threat detection and prevention framework

E Erdin, H Aksu, S Uluagac, M Vai… - MILCOM 2018-2018 …, 2018 - ieeexplore.ieee.org
Governmental and military institutions harbor critical infrastructure and highly confidential
information. Although institutions are investing a lot for protecting their data and assets from …

USB-watch: A generalized hardware-assisted insider threat detection framework

K Denney, L Babun, AS Uluagac - Journal of Hardware and Systems …, 2020 - Springer
Today, the USB protocol is among the most widely used protocols—mostly due to its plug-
and-play nature and number of supported devices. However, the mass-proliferation of USB …

USB-watch: A dynamic hardware-assisted USB threat detection framework

K Denney, E Erdin, L Babun, M Vai… - Security and Privacy in …, 2019 - Springer
The USB protocol is among the most widely adopted protocols today thanks to its plug-and-
play capabilities and the vast number of devices which support the protocol. However, this …

Dynamically detecting usb attacks in hardware: Poster

K Denney, E Erdin, L Babun, AS Uluagac - Proceedings of the 12th …, 2019 - dl.acm.org
Malicious USB devices can disguise themselves as benign devices (eg, keyboard, mouse,
etc.) to insert malicious commands on end devices. Advanced software-based detection …

Making {USB} great again with {USBFILTER}

DJ Tian, N Scaife, A Bates, K Butler… - 25th USENIX Security …, 2016 - usenix.org
USB provides ubiquitous plug-and-play connectivity for a wide range of devices. However,
the complex nature of USB obscures the true functionality of devices from the user, and …

Malicious insider attack detection in IoTs using data analytics

AY Khan, R Latif, S Latif, S Tahir, G Batool… - IEEE Access, 2019 - ieeexplore.ieee.org
Internet of Things (IoTs) are set to revolutionize our lives and are widely being adopted
nowadays. The IoT devices have a range of applications including smart homes, smart …

A review of insider threat detection approaches with IoT perspective

A Kim, J Oh, J Ryu, K Lee - IEEE Access, 2020 - ieeexplore.ieee.org
Security professionals, government agencies, and corporate organizations have found an
inherent need to prevent or mitigate attacks from insider threats. Accordingly, active research …

A novel insider attack and machine learning based detection for the internet of things

M Chowdhury, B Ray, S Chowdhury… - ACM Transactions on …, 2021 - dl.acm.org
Due to the widespread functional benefits, such as supporting internet connectivity, having
high visibility and enabling easy connectivity between sensors, the Internet of Things (IoT) …

User behaviour based insider threat detection in critical infrastructures

M Singh, BM Mehtre… - 2021 2nd International …, 2021 - ieeexplore.ieee.org
Cyber security is an important concern in critical infrastructures such as banking and
financial organizations, where a number of malicious insiders are involved. These insiders …

Curtain: keep your hosts away from USB attacks

J Fu, J Huang, L Zhang - … Security: 20th International Conference, ISC 2017 …, 2017 - Springer
In recent years, many attacks targeting USB were proposed. Besides spreading virus
through USB storage, attackers are tending to attack USB stacks because in most cases, any …