An advanced data leakage detection system analyzing relations between data leak activity

نویسندگان

  • Min-Ji Seo
  • Myung-Ho Kim
چکیده

In order to prevent the data leakage by the internal staff, the companies protect important information of the company by inputting the behavior pattern related to the data leakage into the system in advance and by defining the employee as the staff who leaked the data, whose behavior pattern is detected when such inputted behavior pattern is detected. However, in the case of the existing system, if the data is leaked according to the pattern of the security log occurrence which is not inputted into the system, whether of the data leakage cannot be properly detected. Therefore, this study proposes a system to prevent the leakage of data in a data leakage pattern that is not input to the system by defining a set of security logs that can appear simultaneously at the time of data leakage through association analysis algorithm as a data leakage judgment scenario. As a result of experimenting the function of the system suggested, this study judged whether of data leakage with higher accuracy than the data leak detection system which does not apply association analysis algorithm, also it showed lower percentage of false positive and false Negative. This suggests that the proposed system is less likely to misjudge data leakage.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

LEAK DETECTION IN WATER DISTRIBUTION SYSTEM USING NON-LINEAR KALMAN FILTER

Leakage detection in water distribution systems play an important role in storage and management of water resources. Therefore, to reduce water loss in these systems, a method should be introduced that reacts rapidly to such events and determines their occurrence time and location with the least possible error. In this study, in order to determine position and amount of leakage in distribution ...

متن کامل

A Survey on Potential Privacy Leaks of GPS Information in Android Applications

....................................................................... iii ACKNOWLEDGEMENTS...................................................... iv TABLE OF CONTENTS......................................................... v LIST OF TABLES................................................................. ix LIST OF FIGURES............................................................... x CHAPTE...

متن کامل

Calibration curves for on-line leakage detection using radiotracer injection method

One of the most important requirements for industrial pipelines is the leakage detection. In this paper, detection of leak and determination of its amount using radioactive tracer injection method has been simulated by Monte Carlo MCNP code. The detector array included two NaI (Tl) detectors which were located before and after the considered position, measure emitted gamma from radioactive trac...

متن کامل

A Review on Data Leakage Detection

This paper contains concept of data leakage, its causes of leakage and different techniques to protect and detect the data leakage. The value of the data is incredible, so it should not be leaked or altered. In the field of IT, huge database is being used. This database is shared with multiple people at a time. But during this sharing of the data, there are huge chances of data vulnerability, l...

متن کامل

Data Leakage Detection: A Survey

This paper contains concept of data leakage, its causes of leakage and different techniques to protect and detect the data leakage. The value of the data is incredible, so it should not be leaked or altered. In the field of IT. huge database is being used. This database is shared with multiple people at a time. But during this sharing of the data, there are huge chances of data vulnerability, l...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017