Title: The Unwitting Danger Within - Detection, Investigation and Mitigation of a Compromised Network

Issue Number: Vol. 5, No. 4
Year of Publication: Jan - 2016
Page Numbers: 208-222
Authors: Hasan Al-Qadeeb, Qasem Abu Al-Haija, Noor A. Jebril
Journal Name: International Journal of Cyber-Security and Digital Forensics (IJCSDF)
- Hong Kong
DOI:  http://dx.doi.org/10.17781/P002222

Abstract:


The war on cyber security issues has exploded exponentially. Persistent attacks are on the rise routinely penetrating perimeter defenses and bypassing antivirus technologies to successfully launch attacks against endpoints and servers. The Internet of Things [IoTs] have motivated hackers to compromise networks but a massive data breach does not have to be. Businesses, hospitality, travel, healthcare, insurance, financial institutions, retails and other big enterprise systems succumbed to lingering, multistage attacks that siphoned sensitive, and valuable data out of the respective networks. This study will generate next generation end-point security systems that will identify evil, or unusual and abnormal patterns in an intrusion scheme. The outcome will know abnormal by finding Evil. Recommendation for best practices will be provided.