Spelling suggestions: "subject:"agentless"" "subject:"scentless""
1 |
Agentless endpoint security monitoring frameworkGhaleb, Asem 28 May 2019 (has links)
Existing endpoint security monitors use agents that must be installed on every
computing host or endpoint. However, as the number of monitored hosts increases,
agents installation, con figuration and maintenance become arduous and requires more
efforts. Moreover, installed agents can increase the security threat footprint and
several companies impose restrictions on using agents on every computing system.
This work provides a generic agentless endpoint framework for security monitoring of
computing systems. The computing hosts are accessed by the monitoring framework
running on a central server. Since the monitoring framework is separate from the
computing hosts for which the monitoring is being performed, the various security
models of the framework can perform data retrieval and analysis without utilizing
agents executing within the computing hosts. The monitoring framework retrieves
transparently raw data from the monitored computing hosts that are then fed to the
security modules integrated with the framework. These modules analyze the received
data to perform security monitoring of the target computing hosts. As a use case, a
real-time intrusion detection model has been implemented to detect abnormal behaviors on computing hosts based on the data collected using the introduced framework. / Graduate
|
2 |
Improving DLP system security / Förbättring av säkerheten av DLP systemGhorbanian, Sara, Fryklund, Glenn January 2014 (has links)
Context. Data leakage prevention (DLP), a system designed to prevent leakage and loss of secret sensitive data and at the same time not affect employees workflow. The aim is to have a system covering every possible leakage point that exist. Even if these are covered, there are ways of hiding information such as obfuscating a zip archive within an image file, detecting this hidden information and preventing it from leaking is a difficult task. Companies pay a great deal for these solutions and yet, as we uncover, the information is not safe. Objectives. In this thesis we evaluate four different existing types of DLP systems out on the market today, disclosing their weaknesses and found ways of improving their security. Methods. The four DLP systems tested in this study cover agentless, agent based, hybrids and regular expression DLP tools. The test cases simulate potential leakage points via every day used file transfer applications and media such as USB, Skype, email, etc. Results. We present a hypothetical solution in order to amend these weaknesses and to improve the efficiency of DLP systems today. In addition to these evaluations and experiments, a complementing proof of concept solution has been developed that can be integrated with other DLP solutions. Conclusions. We conclude that the exisiting DLP systems are still in need of improvement, none of the tested DLP solutions fully covered the possible leakage points that could exist in the corporate world. There is a need for continued evaluation of DLP systems, aspects and leakage points not covered in this thesis as well as a follow up on our suggested solution.
|
Page generated in 0.0392 seconds