2016 International Conference on Information Communication and Embedded Systems (ICICES) 2016
DOI: 10.1109/icices.2016.7518934
|View full text |Cite
|
Sign up to set email alerts
|

Data leakage prevention system with time stamp

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 2 publications
0
5
0
Order By: Relevance
“…One important aspect for such a framework should be the consideration and development of a comprehensive dataset. We found that there exist some datasets ( [119], [121], [150], [162]) for evaluating data exfiltration countermeasures, however, these datasets are small in size and limited in quality. These limitations make the datasets unable to reflect the actual strengths and weaknesses of the proposed countermeasure.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…One important aspect for such a framework should be the consideration and development of a comprehensive dataset. We found that there exist some datasets ( [119], [121], [150], [162]) for evaluating data exfiltration countermeasures, however, these datasets are small in size and limited in quality. These limitations make the datasets unable to reflect the actual strengths and weaknesses of the proposed countermeasure.…”
Section: Discussionmentioning
confidence: 99%
“…Peneti et al [121] present an approach for data leakage prevention based on timestamp. The proposed approach consists of two phases: (1) Learning phase: all documents of an organization are collected to create clusters of data, calculate scores for key terms in the documents and assign a timestamp to each document based on the organization's schedule (2) Detection phase: the outgoing documents' timestamps are compared with the timestamps of the documents in the identified clusters; based on the results of the comparison, a decision is made whether or not the documents are allowed to be sent.…”
Section: Inspecting Unencrypted Trafficmentioning
confidence: 99%
See 2 more Smart Citations
“…DLPSs use the statistical/ analytical approach, data fingerprinting, regular expressions on context and content of data to identify and avoid unauthorized access to data [10]. DLP approach performs deep content analysis and observes the data access by users to discover improper usage [11][12][13]. DLP systems employ a model using either knowledge of an expert or may train/learn from available past records (Fig.…”
Section: Introductionmentioning
confidence: 99%