2016 IEEE Security and Privacy Workshops (SPW) 2016
DOI: 10.1109/spw.2016.24
|View full text |Cite
|
Sign up to set email alerts
|

A Hybrid Framework for Data Loss Prevention and Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
38
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 41 publications
(38 citation statements)
references
References 22 publications
0
38
0
Order By: Relevance
“…There have been a number of studies in profiling users’ normal behaviors to identify intruders or insiders . Instead of detecting the presence of sensitive data, Mathew et al proposed to model normal users’ data access patterns and raise an alarm when a user deviates from the normal profile, in order to mitigate insider threat in database systems.…”
Section: Dlpd Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…There have been a number of studies in profiling users’ normal behaviors to identify intruders or insiders . Instead of detecting the presence of sensitive data, Mathew et al proposed to model normal users’ data access patterns and raise an alarm when a user deviates from the normal profile, in order to mitigate insider threat in database systems.…”
Section: Dlpd Techniquesmentioning
confidence: 99%
“…• Instead of trying to identify the presence of sensitive content, on the contrary, context-based approaches 7,8,[31][32][33][34][35] mainly perform contextual analysis of the meta information associated with the monitored data or context surrounding the data. Some DLPD solutions are hybrid approaches that analyze both content and context.…”
Section: Existing Dlpd Techniquesmentioning
confidence: 99%
“…Costante et al presented a hybrid approach for data leakage prevention [28]. Existing approaches focus either on prevention, for e.g.…”
Section: Related Workmentioning
confidence: 99%
“…Only those transactions are considered to be legitimate that will match the model. Two main approaches are used to build the model i) Specification approach and ii) Learning-approach [28].…”
Section: Current Approaches For Dlpmentioning
confidence: 99%
“…Only those transactions are considered to be legitimate that will match the model. Two main approaches are used to build the model i) Specification approach and ii) Learning-approach [12].…”
Section: This Section Categorizes Current Approaches For Data Leakagementioning
confidence: 99%