Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 1 of 1
Full-Text Articles in Computer Engineering
Application Of Genomic Compression Techniques For Efficient Storage Of Captured Network Traffic Packets, James Alfred Loving
Application Of Genomic Compression Techniques For Efficient Storage Of Captured Network Traffic Packets, James Alfred Loving
CCE Theses and Dissertations
In cybersecurity, one of most important forensic tools are audit files; they contain a record of cyber events that occur on systems throughout the enterprise. Threats to an enterprise have become one of the top concerns of IT professionals world-wide. Although there are various approaches to detect anomalous insider behavior, these approaches are not always able to detect advanced persistent threats or even exfiltration of sensitive data by insiders. The issue is the volume of network data required to identify this anomalous activity. It has been estimated that an average corporate user creates a minimum of 1.5 MB audit data …