2022
DOI: 10.1007/s10586-022-03668-2
|View full text |Cite
|
Sign up to set email alerts
|

Survey of Techniques on Data Leakage Protection and Methods to address the Insider threat

Abstract: Data leakage is a problem that companies and organizations face every day around the world. Mainly the data leak caused by the internal threat posed by authorized personnel to manipulate confidential information. The main objective of this work is to survey the literature to detect the existing techniques to protect against data leakage and to identify the methods used to address the insider threat. For this, a literature review of scientific databases was carried out in the period from 2011 to 2022, which res… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(2 citation statements)
references
References 60 publications
0
2
0
Order By: Relevance
“…For training and validating the forecasting models, we first split the examples resulting from the sliding window technique into train, validation and test datasets. We took some measures to prevent data leakage issues [Montano et al, 2022]. First, we did the splitting using the proportions 70%, 20% and 10% for train, validation and test datasets, respectively, without shuffling the observations, to maintain the temporal order between datasets.…”
Section: Methodsmentioning
confidence: 99%
“…For training and validating the forecasting models, we first split the examples resulting from the sliding window technique into train, validation and test datasets. We took some measures to prevent data leakage issues [Montano et al, 2022]. First, we did the splitting using the proportions 70%, 20% and 10% for train, validation and test datasets, respectively, without shuffling the observations, to maintain the temporal order between datasets.…”
Section: Methodsmentioning
confidence: 99%
“…Concurrently, data loss prevention (DLP) solutions gained prominence. DLP systems focused on monitoring and preventing the unauthorized transfer of sensitive data, a critical aspect of combating insider threats related to data exfiltration [7]. Furthermore, the integration of machine learning and artificial intelligence (AI) into insider threat detection marked a significant turning point.…”
Section: Background and Motivationmentioning
confidence: 99%