Show simple item record

dc.contributor.advisorBeverly, Robert
dc.contributor.advisorMcCarrin, Michael
dc.contributor.authorJimoh, Mujeeb B.
dc.dateMarch 2015
dc.date.accessioned2015-05-06T19:17:41Z
dc.date.available2015-05-06T19:17:41Z
dc.date.issued2015-03
dc.identifier.urihttp://hdl.handle.net/10945/45198
dc.descriptionApproved for public release; distribution is unlimiteden_US
dc.description.abstractInsider threat is one of the risks both government and private organizations have to deal with in protecting their important information. Data exfiltration and data leakage resulting from insiders’ activities can be very difficult to identify and quantify. Unfortunately, existing solutions that efficiently check whether data moving across a network is known to be sensitive are not resilient to attackers that make changes—even trivial modifications—to the data prior to exfiltration. This capstone examines the potential use of the sdhash approximate matching algorithm within the data exfiltration domain. Sdhash can be employed to look for active transfer of known sensitive files in network traffic, but in practice is hindered by the computational time required to check for known sensitive data. This research tested the performance of both the GPU and CPU implementation of sdhash to determine their suitability in high-network traffic environments such as the Department of Defense. The results of this experiment showed that better performance is achieved with the GPU when comparing large data sets. For small data sets, the CPU and GPU implementations exhibited similar performance. Thus, sdhash in the GPU implementation would be suitable for the Defense Department’s use.en_US
dc.publisherMonterey, California: Naval Postgraduate Schoolen_US
dc.titlePerformance testing of GPU-based approximate matching algorithm on network trafficen_US
dc.typeThesisen_US
dc.contributor.departmentCyber Academic Group
dc.contributor.departmentCyber Academic Groupen_US
dc.subject.authorData exfiltrationen_US
dc.subject.authordata leakageen_US
dc.subject.authorinsider threaten_US
dc.subject.authorapproximate matchingen_US
dc.subject.authorsdhashen_US
dc.subject.authorGPUen_US
dc.subject.authorCPUen_US
dc.subject.authorsimilarity digesten_US
dc.subject.authorand network capture.en_US
etd.thesisdegree.nameMaster of Science in Applied Cyber Operationsen_US
etd.thesisdegree.levelMastersen_US
etd.thesisdegree.disciplineApplied Cyber Operationsen_US
etd.thesisdegree.grantorNaval Postgraduate Schoolen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record