Implementation of Security Systems for Detection and Prevention of Data Loss/Leakage at Organization via Traffic Inspection
Data Loss/Leakage Prevention (DLP) continues to be the main issue for many large organizations. There are multiple numbers of emerging security attach scenarios and a limitless number of overcoming solutions. Today's enterprises' major concern is to protect confidential information because...
Gespeichert in:
Veröffentlicht in: | arXiv.org 2020-12 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | arXiv.org |
container_volume | |
creator | Mir Hassan Chen, Jincai Adnan Iftekhar Shehzad, Adnan Cui, Xiaohui |
description | Data Loss/Leakage Prevention (DLP) continues to be the main issue for many large organizations. There are multiple numbers of emerging security attach scenarios and a limitless number of overcoming solutions. Today's enterprises' major concern is to protect confidential information because a leakage that compromises confidential data means that sensitive information is in competitors' hands. Different data types need to be protected. However, our research is focused only on data in motion (DIM) i-e data transferred through the network. The research and scenarios in this paper demonstrate a recent survey on information and data leakage incidents, which reveals its importance and also proposed a model solution that will offer the combination of previous methodologies with a new way of pattern matching by advanced content checker based on the use of machine learning to protect data within an organization and then take actions accordingly. This paper also proposed a DLP deployment design on the gateway level that shows how data is moving through intermediate channels before reaching the final destination using the squid proxy server and ICAP server. |
format | Article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_2473565894</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2473565894</sourcerecordid><originalsourceid>FETCH-proquest_journals_24735658943</originalsourceid><addsrcrecordid>eNqNjMsKwjAQRYMgKOo_DLgWa9JaXftAQVCoexnqpERtUjOpoP68on6Aq7u455yGaEulRoNJLGVL9JhPURTJcSqTRLXFc11WFyrJBgzGWXAaMsprb8IdsjsHKhm08zCnQPmHQHuEnafbW_kJcwwIG8c83BCesSDAAFtfoDWPb_VmEPYetTY5rC1X31RXNDVemHq_7Yj-crGfrQaVd9eaOBxOrvb2fR1knKpknEymsfqPegGeLU8m</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2473565894</pqid></control><display><type>article</type><title>Implementation of Security Systems for Detection and Prevention of Data Loss/Leakage at Organization via Traffic Inspection</title><source>Freely Accessible Journals</source><creator>Mir Hassan ; Chen, Jincai ; Adnan Iftekhar ; Shehzad, Adnan ; Cui, Xiaohui</creator><creatorcontrib>Mir Hassan ; Chen, Jincai ; Adnan Iftekhar ; Shehzad, Adnan ; Cui, Xiaohui</creatorcontrib><description>Data Loss/Leakage Prevention (DLP) continues to be the main issue for many large organizations. There are multiple numbers of emerging security attach scenarios and a limitless number of overcoming solutions. Today's enterprises' major concern is to protect confidential information because a leakage that compromises confidential data means that sensitive information is in competitors' hands. Different data types need to be protected. However, our research is focused only on data in motion (DIM) i-e data transferred through the network. The research and scenarios in this paper demonstrate a recent survey on information and data leakage incidents, which reveals its importance and also proposed a model solution that will offer the combination of previous methodologies with a new way of pattern matching by advanced content checker based on the use of machine learning to protect data within an organization and then take actions accordingly. This paper also proposed a DLP deployment design on the gateway level that shows how data is moving through intermediate channels before reaching the final destination using the squid proxy server and ICAP server.</description><identifier>EISSN: 2331-8422</identifier><language>eng</language><publisher>Ithaca: Cornell University Library, arXiv.org</publisher><subject>Data integrity ; Data loss ; Inspection ; Leakage ; Machine learning ; Pattern matching ; Security systems ; Servers</subject><ispartof>arXiv.org, 2020-12</ispartof><rights>2020. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>776,780</link.rule.ids></links><search><creatorcontrib>Mir Hassan</creatorcontrib><creatorcontrib>Chen, Jincai</creatorcontrib><creatorcontrib>Adnan Iftekhar</creatorcontrib><creatorcontrib>Shehzad, Adnan</creatorcontrib><creatorcontrib>Cui, Xiaohui</creatorcontrib><title>Implementation of Security Systems for Detection and Prevention of Data Loss/Leakage at Organization via Traffic Inspection</title><title>arXiv.org</title><description>Data Loss/Leakage Prevention (DLP) continues to be the main issue for many large organizations. There are multiple numbers of emerging security attach scenarios and a limitless number of overcoming solutions. Today's enterprises' major concern is to protect confidential information because a leakage that compromises confidential data means that sensitive information is in competitors' hands. Different data types need to be protected. However, our research is focused only on data in motion (DIM) i-e data transferred through the network. The research and scenarios in this paper demonstrate a recent survey on information and data leakage incidents, which reveals its importance and also proposed a model solution that will offer the combination of previous methodologies with a new way of pattern matching by advanced content checker based on the use of machine learning to protect data within an organization and then take actions accordingly. This paper also proposed a DLP deployment design on the gateway level that shows how data is moving through intermediate channels before reaching the final destination using the squid proxy server and ICAP server.</description><subject>Data integrity</subject><subject>Data loss</subject><subject>Inspection</subject><subject>Leakage</subject><subject>Machine learning</subject><subject>Pattern matching</subject><subject>Security systems</subject><subject>Servers</subject><issn>2331-8422</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNqNjMsKwjAQRYMgKOo_DLgWa9JaXftAQVCoexnqpERtUjOpoP68on6Aq7u455yGaEulRoNJLGVL9JhPURTJcSqTRLXFc11WFyrJBgzGWXAaMsprb8IdsjsHKhm08zCnQPmHQHuEnafbW_kJcwwIG8c83BCesSDAAFtfoDWPb_VmEPYetTY5rC1X31RXNDVemHq_7Yj-crGfrQaVd9eaOBxOrvb2fR1knKpknEymsfqPegGeLU8m</recordid><startdate>20201228</startdate><enddate>20201228</enddate><creator>Mir Hassan</creator><creator>Chen, Jincai</creator><creator>Adnan Iftekhar</creator><creator>Shehzad, Adnan</creator><creator>Cui, Xiaohui</creator><general>Cornell University Library, arXiv.org</general><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L6V</scope><scope>M7S</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope></search><sort><creationdate>20201228</creationdate><title>Implementation of Security Systems for Detection and Prevention of Data Loss/Leakage at Organization via Traffic Inspection</title><author>Mir Hassan ; Chen, Jincai ; Adnan Iftekhar ; Shehzad, Adnan ; Cui, Xiaohui</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_journals_24735658943</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Data integrity</topic><topic>Data loss</topic><topic>Inspection</topic><topic>Leakage</topic><topic>Machine learning</topic><topic>Pattern matching</topic><topic>Security systems</topic><topic>Servers</topic><toplevel>online_resources</toplevel><creatorcontrib>Mir Hassan</creatorcontrib><creatorcontrib>Chen, Jincai</creatorcontrib><creatorcontrib>Adnan Iftekhar</creatorcontrib><creatorcontrib>Shehzad, Adnan</creatorcontrib><creatorcontrib>Cui, Xiaohui</creatorcontrib><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Mir Hassan</au><au>Chen, Jincai</au><au>Adnan Iftekhar</au><au>Shehzad, Adnan</au><au>Cui, Xiaohui</au><format>book</format><genre>document</genre><ristype>GEN</ristype><atitle>Implementation of Security Systems for Detection and Prevention of Data Loss/Leakage at Organization via Traffic Inspection</atitle><jtitle>arXiv.org</jtitle><date>2020-12-28</date><risdate>2020</risdate><eissn>2331-8422</eissn><abstract>Data Loss/Leakage Prevention (DLP) continues to be the main issue for many large organizations. There are multiple numbers of emerging security attach scenarios and a limitless number of overcoming solutions. Today's enterprises' major concern is to protect confidential information because a leakage that compromises confidential data means that sensitive information is in competitors' hands. Different data types need to be protected. However, our research is focused only on data in motion (DIM) i-e data transferred through the network. The research and scenarios in this paper demonstrate a recent survey on information and data leakage incidents, which reveals its importance and also proposed a model solution that will offer the combination of previous methodologies with a new way of pattern matching by advanced content checker based on the use of machine learning to protect data within an organization and then take actions accordingly. This paper also proposed a DLP deployment design on the gateway level that shows how data is moving through intermediate channels before reaching the final destination using the squid proxy server and ICAP server.</abstract><cop>Ithaca</cop><pub>Cornell University Library, arXiv.org</pub><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | EISSN: 2331-8422 |
ispartof | arXiv.org, 2020-12 |
issn | 2331-8422 |
language | eng |
recordid | cdi_proquest_journals_2473565894 |
source | Freely Accessible Journals |
subjects | Data integrity Data loss Inspection Leakage Machine learning Pattern matching Security systems Servers |
title | Implementation of Security Systems for Detection and Prevention of Data Loss/Leakage at Organization via Traffic Inspection |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T13%3A08%3A54IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=document&rft.atitle=Implementation%20of%20Security%20Systems%20for%20Detection%20and%20Prevention%20of%20Data%20Loss/Leakage%20at%20Organization%20via%20Traffic%20Inspection&rft.jtitle=arXiv.org&rft.au=Mir%20Hassan&rft.date=2020-12-28&rft.eissn=2331-8422&rft_id=info:doi/&rft_dat=%3Cproquest%3E2473565894%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2473565894&rft_id=info:pmid/&rfr_iscdi=true |