Poster: High Performance Data Leak Detection
نویسندگان
چکیده
Data leaks on personal computers and organization networks may be caused by mistakes of users (e.g., accidentally sending sensitive documents to a wrong recipient), stolen laptops, malicious insiders, and infection with malicious software. Preventing data leaks typically require a suite of security technologies, including firewalls and intrusion detection/prevention systems at the network, as well as file encryption, strong authentication, and high system assurance tools on the hosts. The multiple points of security measures are complementary to each other and this paper addresses the problem of network-based data leak detection, specifically, how to accurately and efficiently inspect traffic content for patterns of sensitive information. The data may be transformed during the transmission. Network-based data leak detection (DLD) imposes unique research challenges, including:
منابع مشابه
INVERSE FREQUENCY RESPONSE ANALYSIS FOR PIPELINES LEAK DETECTION USING THE PARTICLE SWARM OPTIMIZATION
Inverse Transient Analysis (ITA) is a powerful approach for leak detection of pipelines. When the pipe transient flow is analyzed in frequency domain the ITA is called Inverse Frequency Response Analysis (IFRA). To implement an IFRA for leak detection, a transient state is initiated in the pipe by fast closure of the downstream end valve. Then, the pressure time history at the valve location is...
متن کاملStatistical Review of Major Standpoints in Hydraulic Transient-Based Leak Detection
Today, pipe systems are the most common facilities to convey various fluids from one place to another. In such facilities faults like leaks lead to advert consequences such as economic losses and social health threats. The fact that early detection of leaks can play a prominent role in reducing the amount of these undesired impacts has absorbed noticeable attention from researchers to this fiel...
متن کاملD352408X012 - Best Practices in Leak and Theft Detection.indd
In the Oil & Gas pipeline leak detection market today, there are several software based methodologies available – ranging from simplistic pressure wave methods, to real-time model-based volume balance techniques. All approaches have inherent advantages and disadvantages, defi nable in terms of simplicity of implementation/maintenance needs, reliability, cost, robustness, availability, and accur...
متن کاملState-of-the-Art in Leak Detection and Localisation
Many fluids transported by pipelines are hazardous. It is therefore often necessary to install leak detection (and localization) systems (LDS), especially due to legal regulations like • the Code for Federal Regulations (CFR) Title 49 Part 195 [1], API 1130 2 Ed. [2], both for the USA, or • the Technische Regeln für Fernleitungen (TRFL) (Technical Rules for Pipelines) in Germany [5]. This p...
متن کاملEffects of Flow Hydraulics, Pipe Structure and Submerged Jet on Leak Behaviour
The aim of this paper is numerical and experimental study of the effects of flow hydraulics, pipe structure (particularly elastic behaviour) and submerged jet on leak behaviour. In this regard, experimental tests were performed on a high-pressure circulation set up. Experiments were performed on an old steel pipe and a High Density Polyethylene (HDPE) pipe discharged to the atmosphere in a wide...
متن کامل