{"title":"用于具有高度机密数据源的大型组织的集成数据泄露监视工具","authors":"N. Suresh, N. Malhotra, R. Kumar, B. Thanudas","doi":"10.1109/CEEC.2012.6375395","DOIUrl":null,"url":null,"abstract":"Data security in a highly confidential large network is of paramount importance. Confidential data networks belonging to secret agencies and government organizations are common targets for data exfiltration. This has become a growing concern in such networks. Present day intrusion detection and prevention systems and firewalls cannot possibly prevent an insider exfiltrating vital data for ulterior purposes. Hence developing an exfiltration detection tool that exclusively detects data exfiltration is of much importance. In this paper, we present an integrated monitoring tool that detects data exfiltration. This tool employs twofold approach in detecting exfiltration 1) Profiling traffic - in/out correlation 2) Estimating FTP Server access.","PeriodicalId":142286,"journal":{"name":"2012 4th Computer Science and Electronic Engineering Conference (CEEC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"An integrated data exfiltration monitoring tool for a large organization with highly confidential data source\",\"authors\":\"N. Suresh, N. Malhotra, R. Kumar, B. Thanudas\",\"doi\":\"10.1109/CEEC.2012.6375395\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Data security in a highly confidential large network is of paramount importance. Confidential data networks belonging to secret agencies and government organizations are common targets for data exfiltration. This has become a growing concern in such networks. Present day intrusion detection and prevention systems and firewalls cannot possibly prevent an insider exfiltrating vital data for ulterior purposes. Hence developing an exfiltration detection tool that exclusively detects data exfiltration is of much importance. In this paper, we present an integrated monitoring tool that detects data exfiltration. This tool employs twofold approach in detecting exfiltration 1) Profiling traffic - in/out correlation 2) Estimating FTP Server access.\",\"PeriodicalId\":142286,\"journal\":{\"name\":\"2012 4th Computer Science and Electronic Engineering Conference (CEEC)\",\"volume\":\"2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-12-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 4th Computer Science and Electronic Engineering Conference (CEEC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CEEC.2012.6375395\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 4th Computer Science and Electronic Engineering Conference (CEEC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CEEC.2012.6375395","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An integrated data exfiltration monitoring tool for a large organization with highly confidential data source
Data security in a highly confidential large network is of paramount importance. Confidential data networks belonging to secret agencies and government organizations are common targets for data exfiltration. This has become a growing concern in such networks. Present day intrusion detection and prevention systems and firewalls cannot possibly prevent an insider exfiltrating vital data for ulterior purposes. Hence developing an exfiltration detection tool that exclusively detects data exfiltration is of much importance. In this paper, we present an integrated monitoring tool that detects data exfiltration. This tool employs twofold approach in detecting exfiltration 1) Profiling traffic - in/out correlation 2) Estimating FTP Server access.