Implementation of Security Systems for Detection and Prevention of Data Loss/Leakage at Organization via Traffic Inspection

Data Loss/Leakage Prevention (DLP) continues to be the main issue for many large organizations. There are multiple numbers of emerging security attach scenarios and a limitless number of overcoming solutions. Today's enterprises' major concern is to protect confidential information because...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:arXiv.org 2020-12
Hauptverfasser: Mir Hassan, Chen, Jincai, Adnan Iftekhar, Shehzad, Adnan, Cui, Xiaohui
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title arXiv.org
container_volume
creator Mir Hassan
Chen, Jincai
Adnan Iftekhar
Shehzad, Adnan
Cui, Xiaohui
description Data Loss/Leakage Prevention (DLP) continues to be the main issue for many large organizations. There are multiple numbers of emerging security attach scenarios and a limitless number of overcoming solutions. Today's enterprises' major concern is to protect confidential information because a leakage that compromises confidential data means that sensitive information is in competitors' hands. Different data types need to be protected. However, our research is focused only on data in motion (DIM) i-e data transferred through the network. The research and scenarios in this paper demonstrate a recent survey on information and data leakage incidents, which reveals its importance and also proposed a model solution that will offer the combination of previous methodologies with a new way of pattern matching by advanced content checker based on the use of machine learning to protect data within an organization and then take actions accordingly. This paper also proposed a DLP deployment design on the gateway level that shows how data is moving through intermediate channels before reaching the final destination using the squid proxy server and ICAP server.
format Article
fullrecord <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_2473565894</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2473565894</sourcerecordid><originalsourceid>FETCH-proquest_journals_24735658943</originalsourceid><addsrcrecordid>eNqNjMsKwjAQRYMgKOo_DLgWa9JaXftAQVCoexnqpERtUjOpoP68on6Aq7u455yGaEulRoNJLGVL9JhPURTJcSqTRLXFc11WFyrJBgzGWXAaMsprb8IdsjsHKhm08zCnQPmHQHuEnafbW_kJcwwIG8c83BCesSDAAFtfoDWPb_VmEPYetTY5rC1X31RXNDVemHq_7Yj-crGfrQaVd9eaOBxOrvb2fR1knKpknEymsfqPegGeLU8m</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2473565894</pqid></control><display><type>article</type><title>Implementation of Security Systems for Detection and Prevention of Data Loss/Leakage at Organization via Traffic Inspection</title><source>Freely Accessible Journals</source><creator>Mir Hassan ; Chen, Jincai ; Adnan Iftekhar ; Shehzad, Adnan ; Cui, Xiaohui</creator><creatorcontrib>Mir Hassan ; Chen, Jincai ; Adnan Iftekhar ; Shehzad, Adnan ; Cui, Xiaohui</creatorcontrib><description>Data Loss/Leakage Prevention (DLP) continues to be the main issue for many large organizations. There are multiple numbers of emerging security attach scenarios and a limitless number of overcoming solutions. Today's enterprises' major concern is to protect confidential information because a leakage that compromises confidential data means that sensitive information is in competitors' hands. Different data types need to be protected. However, our research is focused only on data in motion (DIM) i-e data transferred through the network. The research and scenarios in this paper demonstrate a recent survey on information and data leakage incidents, which reveals its importance and also proposed a model solution that will offer the combination of previous methodologies with a new way of pattern matching by advanced content checker based on the use of machine learning to protect data within an organization and then take actions accordingly. This paper also proposed a DLP deployment design on the gateway level that shows how data is moving through intermediate channels before reaching the final destination using the squid proxy server and ICAP server.</description><identifier>EISSN: 2331-8422</identifier><language>eng</language><publisher>Ithaca: Cornell University Library, arXiv.org</publisher><subject>Data integrity ; Data loss ; Inspection ; Leakage ; Machine learning ; Pattern matching ; Security systems ; Servers</subject><ispartof>arXiv.org, 2020-12</ispartof><rights>2020. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>776,780</link.rule.ids></links><search><creatorcontrib>Mir Hassan</creatorcontrib><creatorcontrib>Chen, Jincai</creatorcontrib><creatorcontrib>Adnan Iftekhar</creatorcontrib><creatorcontrib>Shehzad, Adnan</creatorcontrib><creatorcontrib>Cui, Xiaohui</creatorcontrib><title>Implementation of Security Systems for Detection and Prevention of Data Loss/Leakage at Organization via Traffic Inspection</title><title>arXiv.org</title><description>Data Loss/Leakage Prevention (DLP) continues to be the main issue for many large organizations. There are multiple numbers of emerging security attach scenarios and a limitless number of overcoming solutions. Today's enterprises' major concern is to protect confidential information because a leakage that compromises confidential data means that sensitive information is in competitors' hands. Different data types need to be protected. However, our research is focused only on data in motion (DIM) i-e data transferred through the network. The research and scenarios in this paper demonstrate a recent survey on information and data leakage incidents, which reveals its importance and also proposed a model solution that will offer the combination of previous methodologies with a new way of pattern matching by advanced content checker based on the use of machine learning to protect data within an organization and then take actions accordingly. This paper also proposed a DLP deployment design on the gateway level that shows how data is moving through intermediate channels before reaching the final destination using the squid proxy server and ICAP server.</description><subject>Data integrity</subject><subject>Data loss</subject><subject>Inspection</subject><subject>Leakage</subject><subject>Machine learning</subject><subject>Pattern matching</subject><subject>Security systems</subject><subject>Servers</subject><issn>2331-8422</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNqNjMsKwjAQRYMgKOo_DLgWa9JaXftAQVCoexnqpERtUjOpoP68on6Aq7u455yGaEulRoNJLGVL9JhPURTJcSqTRLXFc11WFyrJBgzGWXAaMsprb8IdsjsHKhm08zCnQPmHQHuEnafbW_kJcwwIG8c83BCesSDAAFtfoDWPb_VmEPYetTY5rC1X31RXNDVemHq_7Yj-crGfrQaVd9eaOBxOrvb2fR1knKpknEymsfqPegGeLU8m</recordid><startdate>20201228</startdate><enddate>20201228</enddate><creator>Mir Hassan</creator><creator>Chen, Jincai</creator><creator>Adnan Iftekhar</creator><creator>Shehzad, Adnan</creator><creator>Cui, Xiaohui</creator><general>Cornell University Library, arXiv.org</general><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L6V</scope><scope>M7S</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope></search><sort><creationdate>20201228</creationdate><title>Implementation of Security Systems for Detection and Prevention of Data Loss/Leakage at Organization via Traffic Inspection</title><author>Mir Hassan ; Chen, Jincai ; Adnan Iftekhar ; Shehzad, Adnan ; Cui, Xiaohui</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_journals_24735658943</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Data integrity</topic><topic>Data loss</topic><topic>Inspection</topic><topic>Leakage</topic><topic>Machine learning</topic><topic>Pattern matching</topic><topic>Security systems</topic><topic>Servers</topic><toplevel>online_resources</toplevel><creatorcontrib>Mir Hassan</creatorcontrib><creatorcontrib>Chen, Jincai</creatorcontrib><creatorcontrib>Adnan Iftekhar</creatorcontrib><creatorcontrib>Shehzad, Adnan</creatorcontrib><creatorcontrib>Cui, Xiaohui</creatorcontrib><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Mir Hassan</au><au>Chen, Jincai</au><au>Adnan Iftekhar</au><au>Shehzad, Adnan</au><au>Cui, Xiaohui</au><format>book</format><genre>document</genre><ristype>GEN</ristype><atitle>Implementation of Security Systems for Detection and Prevention of Data Loss/Leakage at Organization via Traffic Inspection</atitle><jtitle>arXiv.org</jtitle><date>2020-12-28</date><risdate>2020</risdate><eissn>2331-8422</eissn><abstract>Data Loss/Leakage Prevention (DLP) continues to be the main issue for many large organizations. There are multiple numbers of emerging security attach scenarios and a limitless number of overcoming solutions. Today's enterprises' major concern is to protect confidential information because a leakage that compromises confidential data means that sensitive information is in competitors' hands. Different data types need to be protected. However, our research is focused only on data in motion (DIM) i-e data transferred through the network. The research and scenarios in this paper demonstrate a recent survey on information and data leakage incidents, which reveals its importance and also proposed a model solution that will offer the combination of previous methodologies with a new way of pattern matching by advanced content checker based on the use of machine learning to protect data within an organization and then take actions accordingly. This paper also proposed a DLP deployment design on the gateway level that shows how data is moving through intermediate channels before reaching the final destination using the squid proxy server and ICAP server.</abstract><cop>Ithaca</cop><pub>Cornell University Library, arXiv.org</pub><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier EISSN: 2331-8422
ispartof arXiv.org, 2020-12
issn 2331-8422
language eng
recordid cdi_proquest_journals_2473565894
source Freely Accessible Journals
subjects Data integrity
Data loss
Inspection
Leakage
Machine learning
Pattern matching
Security systems
Servers
title Implementation of Security Systems for Detection and Prevention of Data Loss/Leakage at Organization via Traffic Inspection
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T13%3A08%3A54IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=document&rft.atitle=Implementation%20of%20Security%20Systems%20for%20Detection%20and%20Prevention%20of%20Data%20Loss/Leakage%20at%20Organization%20via%20Traffic%20Inspection&rft.jtitle=arXiv.org&rft.au=Mir%20Hassan&rft.date=2020-12-28&rft.eissn=2331-8422&rft_id=info:doi/&rft_dat=%3Cproquest%3E2473565894%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2473565894&rft_id=info:pmid/&rfr_iscdi=true