DocumentCode :
2151518
Title :
Robust data leakage and email filtering system
Author :
Agarwal, Ankit ; Gaikwad, Mayur ; Garg, Kapil ; Inamdar, Vahid
Author_Institution :
Dept. of Inf. Technol., Univ. of Pune, Pune, India
fYear :
2012
fDate :
21-22 March 2012
Firstpage :
1032
Lastpage :
1035
Abstract :
Data leakage can be elaborated as in when a data distributor has given sensitive data to a set of supposedly trusted agents and some of the data is leaked and found in an unauthorized place. An enterprise data leak is a scary proposition. Security practitioners have always had to deal with data leakage issues that arise from various ways like e-mail, IM and other Internet channels. In case of data leakage from trusted agents, the distributor must assess the likelihood that the leaked data came from one or more agents. This can be done by using a system which can identify those parties who are guilty for such leakage even when data is altered. For this the system can use data allocation strategies or can also inject “realistic but fake” data records to improve identification of leakage. Moreover, data can also be leaked from within an organization through e-mails. Hence, there is also a need to filter these e-mails. This can be done by blocking e-mails which contains images, videos or sensitive data for an organization. Principle used in e-mail filtering is we classify e-mail based the fingerprints of message bodies, the white and black lists of email addresses and the words specific to spam.
Keywords :
authorisation; computer network security; electronic messaging; information filtering; trusted computing; unsolicited e-mail; IM; Internet channels; black lists; data allocation strategies; data assess; data distributor; data leakage identification; email address; email filtering system; enterprise data leakage; instant messaging; message body fingerprints; realistic but fake data records; robust data leakage; spam; trusted agents; white lists; Electronic mail; Filtering; Internet; Watermarking; Communication protocols; Email filtering; Fake objects; Instant messaging; data leak; suspicious activity;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on
Conference_Location :
Kumaracoil
Print_ISBN :
978-1-4673-0211-1
Type :
conf
DOI :
10.1109/ICCEET.2012.6203798
Filename :
6203798
Link To Document :
بازگشت