Fast Detection of Transformed Data Leaks
dc.contributor.author | Shu, Xiaokui | en |
dc.contributor.author | Zhang, Jing | en |
dc.contributor.author | Yao, Danfeng (Daphne) | en |
dc.contributor.author | Feng, Wu-chun | en |
dc.contributor.department | Computer Science | en |
dc.date.accessioned | 2017-03-17T08:35:23Z | en |
dc.date.available | 2017-03-17T08:35:23Z | en |
dc.date.issued | 2016-03-01 | en |
dc.description.abstract | The leak of sensitive data on computer systems poses a serious threat to organizational security. Statistics show that the lack of proper encryption on files and communications due to human errors is one of the leading causes of data loss. Organizations need tools to identify the exposure of sensitive data by screening the content in storage and transmission, i.e., to detect sensitive information being stored or transmitted in the clear. However, detecting the exposure of sensitive information is challenging due to data transformation in the content. Transformations (such as insertion, deletion) result in highly unpredictable leak patterns. In this work, we utilize sequence alignment techniques for detecting complex data-leak patterns. Our algorithm is designed for detecting long and inexact sensitive data patterns. This detection is paired with a comparable sampling algorithm, which allows one to compare the similarity of two separately sampled sequences. Our system achieves good detection accuracy in recognizing transformed leaks. We implement a parallelized version of our algorithms in graphics processing unit that achieves high analysis throughput. We demonstrate the high multithreading scalability of our data leak detection method required by a sizable organization. | en |
dc.description.version | Published version | en |
dc.format.extent | 528 - 542 (15) page(s) | en |
dc.format.mimetype | application/pdf | en |
dc.identifier.doi | https://doi.org/10.1109/TIFS.2015.2503271 | en |
dc.identifier.issn | 1556-6013 | en |
dc.identifier.issue | 3 | en |
dc.identifier.uri | http://hdl.handle.net/10919/76658 | en |
dc.identifier.volume | 11 | en |
dc.language.iso | en | en |
dc.publisher | IEEE | en |
dc.relation.uri | http://gateway.webofknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000370732400006&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=930d57c9ac61a043676db62af60056c1 | en |
dc.rights | In Copyright | en |
dc.rights.uri | http://rightsstatements.org/vocab/InC/1.0/ | en |
dc.subject | Technology | en |
dc.subject | Computer Science, Theory & Methods | en |
dc.subject | Engineering, Electrical & Electronic | en |
dc.subject | Computer Science | en |
dc.subject | Engineering | en |
dc.subject | Data leak detection | en |
dc.subject | content inspection | en |
dc.subject | sampling | en |
dc.subject | alignment | en |
dc.subject | dynamic programming | en |
dc.subject | parallelism | en |
dc.subject | ALGORITHM | en |
dc.subject | ALIGNMENT | en |
dc.subject | SEARCH | en |
dc.title | Fast Detection of Transformed Data Leaks | en |
dc.title.serial | IEEE Transactions On Information Forensics And Security | en |
dc.type | Article - Refereed | en |
dc.type.dcmitype | Text | en |
pubs.organisational-group | /Virginia Tech | en |
pubs.organisational-group | /Virginia Tech/All T&R Faculty | en |
pubs.organisational-group | /Virginia Tech/Engineering | en |
pubs.organisational-group | /Virginia Tech/Engineering/COE T&R Faculty | en |
pubs.organisational-group | /Virginia Tech/Engineering/Computer Science | en |
pubs.organisational-group | /Virginia Tech/Faculty of Health Sciences | en |