Fast Detection of Transformed Data Leaks
TLDR
This paper utilizes sequence alignment techniques for detecting complex data-leak patterns and achieves good detection accuracy in recognizing transformed leaks, and implements a parallelized version of the algorithms in graphics processing unit that achieves high analysis throughput.Abstract:
The leak of sensitive data on computer systems poses a serious threat to organizational security. Statistics show that the lack of proper encryption on files and communications due to human errors is one of the leading causes of data loss. Organizations need tools to identify the exposure of sensitive data by screening the content in storage and transmission, i.e., to detect sensitive information being stored or transmitted in the clear. However, detecting the exposure of sensitive information is challenging due to data transformation in the content. Transformations (such as insertion and deletion) result in highly unpredictable leak patterns. In this paper, we utilize sequence alignment techniques for detecting complex data-leak patterns. Our algorithm is designed for detecting long and inexact sensitive data patterns. This detection is paired with a comparable sampling algorithm, which allows one to compare the similarity of two separately sampled sequences. Our system achieves good detection accuracy in recognizing transformed leaks. We implement a parallelized version of our algorithms in graphics processing unit that achieves high analysis throughput. We demonstrate the high multithreading scalability of our data leak detection method required by a sizable organization.read more
Citations
More filters
Journal ArticleDOI
Enterprise data breach: causes, challenges, prevention, and future directions
TL;DR: This review helps interested readers to learn about enterprise data leak threats, recent data leak incidents, various state-of-the‐art prevention and detection techniques, new challenges, and promising solutions and exciting opportunities.
Proceedings ArticleDOI
Obfuscation-resilient privacy leak detection for mobile apps through differential analysis
Andrea Continella,Yanick Fratantonio,Martina Lindorfer,Alessandro Puccetti,Ali Zand,Christopher Kruegel,Giovanni Vigna +6 more
TL;DR: The main contribution of this work is to make black-box differential analysis practical when applied to modern Android apps and show that the network-based non-determinism can often be explained and eliminated, and it is thus possible to reliably use variations in the network traffic as a strong signal to detect privacy leaks.
Journal ArticleDOI
Enhancing cyber–physical systems with hybrid smart city cyber security architecture for secure public data-smart network
Sudhakar Sengan,V. Subramaniyaswamy,Sreekumar Krishnan Nair,V. Indragandhi,J Manikandan,Logesh Ravi +5 more
TL;DR: A context-specific safety setup for conventional cyber–physical systems for smart cities proposed for HSCCA is recommended and a few prospective areas for exploring and their impact are put forth.
Book
Anomaly Detection as a Service: Challenges, Advances, and Opportunities
TL;DR: This book is focused on data-driven anomaly detection for software, systems, and networks against advanced exploits and attacks, but also on systematizing the body of existing knowledge on anomaly detection.
Journal ArticleDOI
Layer-based privacy and security architecture for cloud data sharing
TL;DR: The experimental results show that time taken in processing 200 documents is 437, 2239, 3142, 3900 for public, confidential, secret and top secret data respectively when the documents are distributed among distinct users, which proves the practicality of the proposed approach.
References
More filters
Journal ArticleDOI
Basic Local Alignment Search Tool
TL;DR: A new approach to rapid sequence comparison, basic local alignment search tool (BLAST), directly approximates alignments that optimize a measure of local similarity, the maximal segment pair (MSP) score.
Journal ArticleDOI
Identification of common molecular subsequences.
TL;DR: This letter extends the heuristic homology algorithm of Needleman & Wunsch (1970) to find a pair of segments, one from each of two long sequences, such that there is no other Pair of segments with greater similarity (homology).
Proceedings Article
Snort - Lightweight Intrusion Detection for Networks
TL;DR: Snort provides a layer of defense which monitors network traffic for predefined suspicious activity or patterns, and alert system administrators when potential hostile traffic is detected.
Journal ArticleDOI
Efficient string matching: an aid to bibliographic search
TL;DR: A simple, efficient algorithm to locate all occurrences of any of a finite number of keywords in a string of text that has been used to improve the speed of a library bibliographic search program by a factor of 5 to 10.
Journal ArticleDOI
A fast string searching algorithm
TL;DR: The algorithm has the unusual property that, in most cases, not all of the first i .” in another string, are inspected.