2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM) 2017
DOI: 10.23919/softcom.2017.8115578
|View full text |Cite
|
Sign up to set email alerts
|

Rule-based system for data leak threat estimation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…Based on the knowledge extracted from the DLP incident alerts, an organization can implement preventative measures by refining DLP security policies to avoid future occurrence of similar incidents. As the scope of data loss prevention is broad, a number of detection methods are commonly used by DLP systems such as context-based, content-based, and content tagging [18,16]. Context-based data inspection relies on analyzing contextual information such as source, destination, size, or recipient of data item in question, while content-based data inspection uses techniques such as pattern or regular expression matching, and text analysis.…”
Section: Data Loss Detection Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…Based on the knowledge extracted from the DLP incident alerts, an organization can implement preventative measures by refining DLP security policies to avoid future occurrence of similar incidents. As the scope of data loss prevention is broad, a number of detection methods are commonly used by DLP systems such as context-based, content-based, and content tagging [18,16]. Context-based data inspection relies on analyzing contextual information such as source, destination, size, or recipient of data item in question, while content-based data inspection uses techniques such as pattern or regular expression matching, and text analysis.…”
Section: Data Loss Detection Methodsmentioning
confidence: 99%
“…Content tagging assigns tags to sensitive data items that form basis for this detection method. In this respect, there are two major approaches in developing model for the underlying DLP solution as outlined in [18,19] i.e. specification and learning based approaches.…”
Section: Data Loss Detection Methodsmentioning
confidence: 99%
See 2 more Smart Citations