A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Comparison and Analysis of Anomaly Detection Methods for Detecting Data Exfiltration
데이터 유출 탐지를 위한 이상 행위 탐지 방법의 비교 및 분석
2016
Journal of the Korea Academia-Industrial cooperation Society
데이터 유출 탐지를 위한 이상 행위 탐지 방법의 비교 및 분석
Military secrets or confidential data of any organization are extremely important assets. They must be discluded from outside. To do this, methods for detecting anomalous attacks and intrusions inside the network have been proposed. However, most anomaly-detection methods only cover aspects of intrusion from outside and do not deal with internal leakage of data, inflicting greater damage than intrusions and attacks from outside. In addition, applying conventional anomaly-detection methods to
doi:10.5762/kais.2016.17.9.440
fatcat:wimavmjksvgchccnnnff2oqc6e