Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1109/EC2ND.2011.21guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

IRILD: An Information Retrieval Based Method for Information Leak Detection

Published: 06 September 2011 Publication History

Abstract

The traditional approach for detecting information leaks is to generate fingerprints of sensitive data, by partitioning and hashing it, and then comparing these fingerprints against outgoing documents. Unfortunately, this approach incurs a high computation cost as every part of document needs to be checked. As a result, it is not applicable to systems with a large number of documents that need to be protected. Additionally, the approach is prone to false positives if the fingerprints are common phrases. In this paper, we propose an improvement for this approach to offer a much faster processing time with less false positives. The core idea of our solution is to eliminate common phrases and non-sensitive phrases from the fingerprinting process. Non-sensitive phrases are identified by looking at available public documents of the organization that we want to protect from information leaks and common phrases are identified with the help of a search engine. In this way, our solution both accelerates leak detection and increases the accuracy of the result. Experiments were conducted on real-world data to prove the efficiency and effectiveness of the proposed solution.

Cited By

View all
  • (2014)Data Leakage QuantificationProceedings of the 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy XXVIII - Volume 856610.1007/978-3-662-43936-4_7(98-113)Online publication date: 14-Jul-2014
  • (2013)de-linkabilityProceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems10.1145/2536146.2536161(68-75)Online publication date: 28-Oct-2013

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
EC2ND '11: Proceedings of the 2011 Seventh European Conference on Computer Network Defense
September 2011
58 pages
ISBN:9780769547626

Publisher

IEEE Computer Society

United States

Publication History

Published: 06 September 2011

Author Tags

  1. fingerprinting
  2. information leaks
  3. privacy

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 21 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2014)Data Leakage QuantificationProceedings of the 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy XXVIII - Volume 856610.1007/978-3-662-43936-4_7(98-113)Online publication date: 14-Jul-2014
  • (2013)de-linkabilityProceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems10.1145/2536146.2536161(68-75)Online publication date: 28-Oct-2013

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media