防止数据泄漏的系统调用拦截框架

H. Balinsky, D. Perez, S. Simske
{"title":"防止数据泄漏的系统调用拦截框架","authors":"H. Balinsky, D. Perez, S. Simske","doi":"10.1109/EDOC.2011.19","DOIUrl":null,"url":null,"abstract":"In this paper, we describe the feasibility and practical study of the recently proposed idea for data leak prevention (DLP) based on end-point policy enforcement. The most reassuring way to prevent sensitive data leak is to thwart sensitive data export before it has a chance to occur. Using a System Call Interception (SCI) technique we investigate the possibility of automatically detecting and amending a non-desired, policy breaching behavior at the \"intention\" stage: as the corresponding system call is called by an application, but before the action has been accomplished. The SCI method is especially valuable for \"black box\" applications, for which source code is not available. In our system, we catalog the system calls involved in the DLP events, and reduce our SCI to the minimum necessary set of system calls associated with the sensitive, DLP-requiring tasks. We describe the system behavior for several different applications that we have studied to date.","PeriodicalId":147466,"journal":{"name":"2011 IEEE 15th International Enterprise Distributed Object Computing Conference","volume":"694 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":"{\"title\":\"System Call Interception Framework for Data Leak Prevention\",\"authors\":\"H. Balinsky, D. Perez, S. Simske\",\"doi\":\"10.1109/EDOC.2011.19\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we describe the feasibility and practical study of the recently proposed idea for data leak prevention (DLP) based on end-point policy enforcement. The most reassuring way to prevent sensitive data leak is to thwart sensitive data export before it has a chance to occur. Using a System Call Interception (SCI) technique we investigate the possibility of automatically detecting and amending a non-desired, policy breaching behavior at the \\\"intention\\\" stage: as the corresponding system call is called by an application, but before the action has been accomplished. The SCI method is especially valuable for \\\"black box\\\" applications, for which source code is not available. In our system, we catalog the system calls involved in the DLP events, and reduce our SCI to the minimum necessary set of system calls associated with the sensitive, DLP-requiring tasks. We describe the system behavior for several different applications that we have studied to date.\",\"PeriodicalId\":147466,\"journal\":{\"name\":\"2011 IEEE 15th International Enterprise Distributed Object Computing Conference\",\"volume\":\"694 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-08-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"15\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 IEEE 15th International Enterprise Distributed Object Computing Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EDOC.2011.19\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 IEEE 15th International Enterprise Distributed Object Computing Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EDOC.2011.19","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 15

摘要

在本文中,我们描述了最近提出的基于端点策略执行的数据泄漏预防(DLP)思想的可行性和实际研究。防止敏感数据泄漏的最可靠的方法是在敏感数据导出有机会发生之前阻止它。使用系统调用拦截(SCI)技术,我们研究了在“意图”阶段自动检测和修改非期望的策略违反行为的可能性:当应用程序调用相应的系统调用时,但在操作完成之前。SCI方法对于无法获得源代码的“黑盒”应用程序特别有价值。在我们的系统中,我们对DLP事件中涉及的系统调用进行编目,并将SCI减少到与敏感的、需要DLP的任务相关的最小系统调用集。我们描述了我们迄今为止研究过的几种不同应用程序的系统行为。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
System Call Interception Framework for Data Leak Prevention
In this paper, we describe the feasibility and practical study of the recently proposed idea for data leak prevention (DLP) based on end-point policy enforcement. The most reassuring way to prevent sensitive data leak is to thwart sensitive data export before it has a chance to occur. Using a System Call Interception (SCI) technique we investigate the possibility of automatically detecting and amending a non-desired, policy breaching behavior at the "intention" stage: as the corresponding system call is called by an application, but before the action has been accomplished. The SCI method is especially valuable for "black box" applications, for which source code is not available. In our system, we catalog the system calls involved in the DLP events, and reduce our SCI to the minimum necessary set of system calls associated with the sensitive, DLP-requiring tasks. We describe the system behavior for several different applications that we have studied to date.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
System Call Interception Framework for Data Leak Prevention Making Business Processes Compliant to Standards and Regulations Trust and Business Webs CoReL: Policy-Based and Model-Driven Regulatory Compliance Management Modeling the Supply and Demand of Architectural Information on Enterprise Level
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1