Preventing Information Leaks in Email
نویسندگان
چکیده
The widespread use of email has raised serious privacy concerns. A critical issue is how to prevent email information leaks, i.e., when a message is accidentally addressed to non-desired recipients. This is an increasingly common problem that can severely harm individuals and corporations — for instance, a single email leak can potentially cause expensive law suits, brand reputation damage, negotiation setbacks and severe financial losses. In this paper we present the first attempt to solve this problem. We begin by redefining it as an outlier detection task, where the unintended recipients are the outliers. Then we combine real email examples (from the Enron Corpus) with carefully simulated leak-recipients to learn textual and network patterns associated with email leaks. This method was able to detect email leaks in almost 82% of the test cases, significantly outperforming all other baselines. More importantly, in a separate set of experiments we applied the proposed method to the task of finding real cases of email leaks. The result was encouraging: a variation of the proposed technique was consistently successful in finding two real cases of email leaks. Not only does this paper introduce the important problem of email leak detection, but also presents an effective solution that can be easily implemented in any email client — with no changes in the email server side.
منابع مشابه
Modeling Intention in Email - Speech Acts, Information Leaks and Recommendation Models
Dear readers, when you are hunting the new book collection to read this day, modeling intention in email speech acts information leaks and recommendation models can be your referred book. Yeah, even many books are offered, this book can steal the reader heart so much. The content and theme of this book really will touch your heart. You can find more and more experience and knowledge how the lif...
متن کاملTightLip: Keeping Applications from Spilling the Beans (presented with demo)
Managing the permissions of any shared space is challenging, even for highly skilled computer users. This task is particularly daunting for untrained PC users, for whom access control errors are routine and can lead to damaging privacy leaks. A 2003 usability study of the Kazaa peer-to-peer file-sharing network found that many users share their entire hard drive with the rest of the Internet, i...
متن کاملInformation Leaks and Suggestions: A Case Study using Mozilla Thunderbird
People often make serious mistakes when addressing email messages. One type of costly mistake is an “email leak”, i.e., accidentally sending a message to an unintended recipient — a widespread problem that can severely harm individuals and corporations. Another type of addressing error is forgetting to add an intended collaborator as recipient, a likely source of costly misunderstandings and co...
متن کاملAnti-tamper and Cryptographic Solutions for Information Protection
Takayoshi Shiraki Makoto Sato Masakazu Noguchi, Dr. Info. Sci. Soichi Furuya, Dr. Eng. OVERVIEW: As leaks of information from public infrastructure systems can cause damage at a national scale, it needs to be recognized as a top priority for national security. Based around anti-tamper and cryptographic technologies, Hitachi supplies solutions for preventing leaks that include tools for blocking...
متن کامل