Title :
An approach to the automated determination of host information value
Author :
Beaver, Justin M. ; Patton, Robert M. ; Potok, Thomas E.
Author_Institution :
Appl. Software Eng. Res. Group, Oak Ridge Nat. Lab., Oak Ridge, TN, USA
Abstract :
Enterprise networks are comprised of thousands of interconnected computer hosts, each of which is capable of creating, removing, and exchanging data according to the needs of their users. Thus, the distribution of high-value, sensitive, and proprietary information across enterprise networks is poorly managed and understood. A significant technology gap in information security is the inability to automatically quantify the value of the information contained on each host in a network. Such insight would allow an enterprise to scale its defenses, react intelligently to an intrusion, manage its configuration audits, and understand the leak potential in the event that a host is compromised. This paper outlines a novel approach to the automated determination of the value of the information contained on a host computer. It involves the classification of each text document on the host machine using the frequency of the document´s terms and phrases. A host information value is computed using an enterprise-defined weighting schema and applying it to a host´s document distribution. The method is adaptable to specific organizational information needs, requires manual intervention only during schema creation, and is repeatable and consistent regardless of changes in information on the host machines.
Keywords :
document handling; information systems; security of data; automated host information value determination; enterprise defined weighting schema; enterprise networks; host document distribution; information security; interconnected computer hosts; text document; Computers; Cost accounting; Manuals; Organizations; Risk management; Standards organizations; cyber security risk management; document classification; host information value; information asset profiling; security informatics;
Conference_Titel :
Computational Intelligence in Cyber Security (CICS), 2011 IEEE Symposium on
Conference_Location :
Paris
Print_ISBN :
978-1-4244-9905-2
DOI :
10.1109/CICYBS.2011.5949398