【24h】

Rapid and parallel content screening for detecting transformed data exposure

机译:快速并行的内容筛选以检测转换后的数据暴露

获取原文

摘要

The leak of sensitive data on computer systems poses a serious threat to organizational security. Organizations need to identify the exposure of sensitive data by screening the content in storage and transmission, i.e., to detect sensitive information being stored or transmitted in the clear. However, detecting the exposure of sensitive information is challenging due to data transformation in the content. Transformations (such as insertion, deletion) result in highly unpredictable leak patterns. Existing automata-based string matching algorithms are impractical for detecting transformed data leaks because of its formidable complexity when modeling the required regular expressions. We design two new algorithms for detecting long and inexact data leaks. Our system achieves high detection accuracy in recognizing transformed leaks compared with the state-of-the-art inspection methods. We parallelize our prototype on graphics processing unit and demonstrate the strong scalability of our data leak detection solution analyzing big data.
机译:计算机系统上敏感数据的泄漏对组织安全构成了严重威胁。组织需要通过筛选存储和传输中的内容来识别敏感数据的暴露,即检测以明文形式存储或传输的敏感信息。但是,由于内容中的数据转换,检测敏感信息的暴露是具有挑战性的。转换(例如插入,删除)会导致高度不可预测的泄漏模式。现有的基于自动机的字符串匹配算法对于检测转换后的数据泄漏不切实际,因为在对所需的正则表达式进行建模时,其复杂性很高。我们设计了两种新算法来检测长时间和不精确的数据泄漏。与最新的检查方法相比,我们的系统在识别变形泄漏方面具有很高的检测精度。我们在图形处理单元上并行处理了原型,并演示了分析大数据的数据泄漏检测解决方案的强大可伸缩性。

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号