scispace - formally typeset
Open AccessJournal ArticleDOI

Fast Detection of Transformed Data Leaks

TLDR
This paper utilizes sequence alignment techniques for detecting complex data-leak patterns and achieves good detection accuracy in recognizing transformed leaks, and implements a parallelized version of the algorithms in graphics processing unit that achieves high analysis throughput.
Abstract
The leak of sensitive data on computer systems poses a serious threat to organizational security. Statistics show that the lack of proper encryption on files and communications due to human errors is one of the leading causes of data loss. Organizations need tools to identify the exposure of sensitive data by screening the content in storage and transmission, i.e., to detect sensitive information being stored or transmitted in the clear. However, detecting the exposure of sensitive information is challenging due to data transformation in the content. Transformations (such as insertion and deletion) result in highly unpredictable leak patterns. In this paper, we utilize sequence alignment techniques for detecting complex data-leak patterns. Our algorithm is designed for detecting long and inexact sensitive data patterns. This detection is paired with a comparable sampling algorithm, which allows one to compare the similarity of two separately sampled sequences. Our system achieves good detection accuracy in recognizing transformed leaks. We implement a parallelized version of our algorithms in graphics processing unit that achieves high analysis throughput. We demonstrate the high multithreading scalability of our data leak detection method required by a sizable organization.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Enterprise data breach: causes, challenges, prevention, and future directions

TL;DR: This review helps interested readers to learn about enterprise data leak threats, recent data leak incidents, various state-of-the‐art prevention and detection techniques, new challenges, and promising solutions and exciting opportunities.
Proceedings ArticleDOI

Obfuscation-resilient privacy leak detection for mobile apps through differential analysis

TL;DR: The main contribution of this work is to make black-box differential analysis practical when applied to modern Android apps and show that the network-based non-determinism can often be explained and eliminated, and it is thus possible to reliably use variations in the network traffic as a strong signal to detect privacy leaks.
Journal ArticleDOI

Enhancing cyber–physical systems with hybrid smart city cyber security architecture for secure public data-smart network

TL;DR: A context-specific safety setup for conventional cyber–physical systems for smart cities proposed for HSCCA is recommended and a few prospective areas for exploring and their impact are put forth.
Book

Anomaly Detection as a Service: Challenges, Advances, and Opportunities

TL;DR: This book is focused on data-driven anomaly detection for software, systems, and networks against advanced exploits and attacks, but also on systematizing the body of existing knowledge on anomaly detection.
Journal ArticleDOI

Layer-based privacy and security architecture for cloud data sharing

TL;DR: The experimental results show that time taken in processing 200 documents is 437, 2239, 3142, 3900 for public, confidential, secret and top secret data respectively when the documents are distributed among distinct users, which proves the practicality of the proposed approach.
References
More filters
Journal ArticleDOI

Basic Local Alignment Search Tool

TL;DR: A new approach to rapid sequence comparison, basic local alignment search tool (BLAST), directly approximates alignments that optimize a measure of local similarity, the maximal segment pair (MSP) score.
Journal ArticleDOI

Identification of common molecular subsequences.

TL;DR: This letter extends the heuristic homology algorithm of Needleman & Wunsch (1970) to find a pair of segments, one from each of two long sequences, such that there is no other Pair of segments with greater similarity (homology).
Proceedings Article

Snort - Lightweight Intrusion Detection for Networks

TL;DR: Snort provides a layer of defense which monitors network traffic for predefined suspicious activity or patterns, and alert system administrators when potential hostile traffic is detected.
Journal ArticleDOI

Efficient string matching: an aid to bibliographic search

TL;DR: A simple, efficient algorithm to locate all occurrences of any of a finite number of keywords in a string of text that has been used to improve the speed of a library bibliographic search program by a factor of 5 to 10.
Journal ArticleDOI

A fast string searching algorithm

TL;DR: The algorithm has the unusual property that, in most cases, not all of the first i.” in another string, are inspected.
Related Papers (5)