Poster: High Performance Data Leak Detection

نویسندگان

  • Xiaokui Shu
  • Jing Zhang
  • Danfeng Yao
  • Wu-chun Feng
چکیده

Data leaks on personal computers and organization networks may be caused by mistakes of users (e.g., accidentally sending sensitive documents to a wrong recipient), stolen laptops, malicious insiders, and infection with malicious software. Preventing data leaks typically require a suite of security technologies, including firewalls and intrusion detection/prevention systems at the network, as well as file encryption, strong authentication, and high system assurance tools on the hosts. The multiple points of security measures are complementary to each other and this paper addresses the problem of network-based data leak detection, specifically, how to accurately and efficiently inspect traffic content for patterns of sensitive information. The data may be transformed during the transmission. Network-based data leak detection (DLD) imposes unique research challenges, including:

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

INVERSE FREQUENCY RESPONSE ANALYSIS FOR PIPELINES LEAK DETECTION USING THE PARTICLE SWARM OPTIMIZATION

Inverse Transient Analysis (ITA) is a powerful approach for leak detection of pipelines. When the pipe transient flow is analyzed in frequency domain the ITA is called Inverse Frequency Response Analysis (IFRA). To implement an IFRA for leak detection, a transient state is initiated in the pipe by fast closure of the downstream end valve. Then, the pressure time history at the valve location is...

متن کامل

Statistical Review of Major Standpoints in Hydraulic Transient-Based Leak Detection

Today, pipe systems are the most common facilities to convey various fluids from one place to another. In such facilities faults like leaks lead to advert consequences such as economic losses and social health threats. The fact that early detection of leaks can play a prominent role in reducing the amount of these undesired impacts has absorbed noticeable attention from researchers to this fiel...

متن کامل

D352408X012 - Best Practices in Leak and Theft Detection.indd

In the Oil & Gas pipeline leak detection market today, there are several software based methodologies available – ranging from simplistic pressure wave methods, to real-time model-based volume balance techniques. All approaches have inherent advantages and disadvantages, defi nable in terms of simplicity of implementation/maintenance needs, reliability, cost, robustness, availability, and accur...

متن کامل

State-of-the-Art in Leak Detection and Localisation

Many fluids transported by pipelines are hazardous. It is therefore often necessary to install leak detection (and localization) systems (LDS), especially due to legal regulations like • the “Code for Federal Regulations (CFR) Title 49 Part 195” [1], API 1130 2 Ed. [2], both for the USA, or • the “Technische Regeln für Fernleitungen” (TRFL) (Technical Rules for Pipelines) in Germany [5]. This p...

متن کامل

Effects of Flow Hydraulics, Pipe Structure and Submerged Jet on Leak Behaviour

The aim of this paper is numerical and experimental study of the effects of flow hydraulics, pipe structure (particularly elastic behaviour) and submerged jet on leak behaviour. In this regard, experimental tests were performed on a high-pressure circulation set up. Experiments were performed on an old steel pipe and a High Density Polyethylene (HDPE) pipe discharged to the atmosphere in a wide...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013