2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications 2013
DOI: 10.1109/trustcom.2013.71
|View full text |Cite
|
Sign up to set email alerts
|

Word N-Gram Based Classification for Data Leakage Prevention

Abstract: Abstract-Revealing sensitive data to unauthorised personal is a serious problem to many organizations that can lead to devastating consequences. Traditionally, prevention of data leak was achieved through firewalls, VPNs and IDS, but without any consideration to sensitive data. In recent years new technologies such as the data leakage prevention systems (DLPs) are developed, especially to either identify and protect sensitive data or monitor and detect sensitive data leakage. One of the most popular approaches… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 3 publications
0
5
0
Order By: Relevance
“…The majority of the literature on sensitivity labelling is associated with Data Loss Prevention (DLP) systems [8][9][10][11][12], notably focusing on classifying sensitivity at the document level. Other research uses sensitivity classification for confidential information redaction on declassified documents [13][14][15], where classification is often performed at finer granularity that reaches the token level.…”
Section: Related Workmentioning
confidence: 99%
“…The majority of the literature on sensitivity labelling is associated with Data Loss Prevention (DLP) systems [8][9][10][11][12], notably focusing on classifying sensitivity at the document level. Other research uses sensitivity classification for confidential information redaction on declassified documents [13][14][15], where classification is often performed at finer granularity that reaches the token level.…”
Section: Related Workmentioning
confidence: 99%
“…Enterprise content aware DLP solution or DLP solution in general offers many approaches to monitor, protect sensitive data at their end points [19]. Generally these types of systems validate and provide authorization to applications whenever access or transfer of confidential data is required.…”
Section: Data Leakage Prevention Systemsmentioning
confidence: 99%
“…These measure are being necessary as usage of external storage devices are becoming unavoidable at the fast growing IT environment. These can be applied to even smartphones and all type of removable devices.The encrypted data can be decrypted only in the system containing the encryption software which was used earlier for encryption also the user must have the encryption key [19]. The data could not be viewed in any other system which does not possess the appropriate algorithm which was used for encryption.…”
Section: A Encryptionmentioning
confidence: 99%
See 1 more Smart Citation
“…The authors apply statistical and signal processing techniques on traffic flow to generate signature and/or extract features for classification purposes. In [23], the authors investigate the use of N-grams for data classification purposes. Their method is based on using the N-grams frequency to classify documents in order to detect and prevent leakage of sensitive and confidential data.…”
Section: Related Workmentioning
confidence: 99%