An advanced data leakage detection system analyzing relations between data leak activity
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Seo, M.-J. | - |
dc.contributor.author | Kim, M.-H. | - |
dc.date.available | 2018-05-09T01:49:38Z | - |
dc.date.created | 2018-04-17 | - |
dc.date.issued | 2017-11 | - |
dc.identifier.issn | 0973-4562 | - |
dc.identifier.uri | http://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/7285 | - |
dc.description.abstract | In order to prevent the data leakage by the internal staff, the companies protect important information of the company by inputting the behavior pattern related to the data leakage into the system in advance and by defining the employee as the staff who leaked the data, whose behavior pattern is detected when such inputted behavior pattern is detected. However, in the case of the existing system, if the data is leaked according to the pattern of the security log occurrence which is not inputted into the system, whether of the data leakage cannot be properly detected. Therefore, this study proposes a system to prevent the leakage of data in a data leakage pattern that is not input to the system by defining a set of security logs that can appear simultaneously at the time of data leakage through association analysis algorithm as a data leakage judgment scenario. As a result of experimenting the function of the system suggested, this study judged whether of data leakage with higher accuracy than the data leak detection system which does not apply association analysis algorithm, also it showed lower percentage of false positive and false Negative. This suggests that the proposed system is less likely to misjudge data leakage. © Research India Publications. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | Research India Publications | - |
dc.relation.isPartOf | International Journal of Applied Engineering Research | - |
dc.title | An advanced data leakage detection system analyzing relations between data leak activity | - |
dc.type | Article | - |
dc.type.rims | ART | - |
dc.identifier.bibliographicCitation | International Journal of Applied Engineering Research, v.12, no.21, pp.11546 - 11554 | - |
dc.description.journalClass | 1 | - |
dc.identifier.scopusid | 2-s2.0-85040237393 | - |
dc.citation.endPage | 11554 | - |
dc.citation.number | 21 | - |
dc.citation.startPage | 11546 | - |
dc.citation.title | International Journal of Applied Engineering Research | - |
dc.citation.volume | 12 | - |
dc.contributor.affiliatedAuthor | Kim, M.-H. | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | N | - |
dc.subject.keywordAuthor | Apriori algorithm | - |
dc.subject.keywordAuthor | Convolutional neural network | - |
dc.subject.keywordAuthor | Data leakage detection | - |
dc.subject.keywordAuthor | Generating data leakage detection scenario | - |
dc.subject.keywordAuthor | Security log analysis | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
Soongsil University Library 369 Sangdo-Ro, Dongjak-Gu, Seoul, Korea (06978)02-820-0733
COPYRIGHT ⓒ SOONGSIL UNIVERSITY, ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.