Jump to ContentJump to Main Navigation
Show Summary Details
In This Section

MACRo 2015

Proceedings of the 5th International Conference on Recent Achievements in Mechatronics, Automation, Computer Sciences and Robotics

1 Issue per year

Open Access
Online
ISSN
2247-0948
See all formats and pricing
In This Section

DATALEAK: Data Leakage Detection System

Adrienn Skrop
  • Department of Computer Science and Systems Technology, Faculty of Information Technology, University of Pannonia, Hungary, e-mail: skrop@dcs.uni-pannon.hu
  • Email:
Published Online: 2015-05-09 | DOI: https://doi.org/10.1515/macro-2015-0011

Abstract

Data leakage is an uncontrolled or unauthorized transmission of classified information to the outside. It poses a serious problem to companies as the cost of incidents continues to increase. Many software solutions were developed to provide data protection. However, data leakage detection systems cannot provide absolute protection. Thus, it is essential to discover data leakage as soon as possible. The purpose of this research is to design and implement a data leakage detection system based on special information retrieval models and methods. In this paper a semantic informationretrieval based approach and the implemented DATALEAK application is presented.

Keywords : Data leakage; mathematical model; vector space; semantic similarity

References

  • [1] A. Shabtai, Y. E. Asaf, and R. Lior, A survey of data leakage detection and prevention solutions. Springer, 2012, ISBN: 978-1-4614-2052-1.

  • [2] A. Skrop, “Data Leakage Detection Using Information Retrieval Methods.” In: IMMM 2014, The Fourth International Conference on Advances in Information Mining and Management, pp. 74-78, 2014.

  • [3] C. T. Meadow, Text Information Retrieval Systems. Academic Press, 2000, ISBN: 0124874053.

  • [4] E. Gessiou, Q. H. Vu, and S. Ioannidis, “IRILD: an Information Retrieval based method for Information Leak Detection,” In Proceedings of European Conference on Computer Network Defense, 2011, pp. 33-40, IEEE.

  • [5] P. Papadimitriou and H. Garcia-Molina, “Data leakage detection," Knowledge and Data Engineering, IEEE Transactions on, vol. 23(1), 2011, pp. 51-63.

  • [6] R. Baeza-Yates and B. Ribeiro-Neto, Modern information retrieval: The Concepts and Technology behind Search (2nd Edition). ACM Press Books, Addison-Wesley Professional, 2011, ISBN: 0321416910.

  • [7] S. Dominich, "Connectionist interaction information retrieval," Information processing & management, vol. 39.2, 2003, pp. 167-193, doi: 10.1016/S0306-4573(02)00046-8. [Crossref]

  • [8] S. Dominich, "Interaction information retrieval," Journal of Documentation, vol. 50.3, 1994, pp. 197-212, doi: 10.1108/eb026930. [Web of Science] [Crossref]

  • [9] S. Dominich, A. Skrop, and Zs. Tuza, “Formal Theory of Connectionist Web Retrieval,” Soft Computing in Web Information Retrieval, Studies in Fuzziness and Soft Computing, vol. 197, 2006, pp. 163-194.

  • [10] W. B. Croft, D.Metzler, and T. Strohman, Search engines: Information retrieval in practice (p. 283). Reading: Addison-Wesley, 2010.

  • [11] Y. Liu, C. Corbett, K. Chiang, R. Archibald, B. Mukherjee, and D. Ghosal, “SIDD: A framework for detecting sensitive data exfiltration by an insider attack,” In System Sciences, 2009, HICSS'09, pp. 1-10, IEEE.

About the article

Received: 2015-01-23

Revised: 2015-02-09

Published Online: 2015-05-09

Published in Print: 2015-03-01



Citation Information: MACRo 2015, ISSN (Online) 2247-0948, DOI: https://doi.org/10.1515/macro-2015-0011. Export Citation

© 2015. This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License. (CC BY-NC-ND 3.0)

Comments (0)

Please log in or register to comment.
Log in