首页> 外文OA文献 >Data exfiltration: A review of external attack vectors and countermeasures
【2h】

Data exfiltration: A review of external attack vectors and countermeasures

机译:数据exfiltration:对外部攻击向量的审查和对策

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

AbstractContext One of the main targets of cyber-attacks is data exfiltration, which is the leakage of sensitive or private data to an unauthorized entity. Data exfiltration can be perpetrated by an outsider or an insider of an organization. Given the increasing number of data exfiltration incidents, a large number of data exfiltration countermeasures have been developed. These countermeasures aim to detect, prevent, or investigate exfiltration of sensitive or private data. With the growing interest in data exfiltration, it is important to review data exfiltration attack vectors and countermeasures to support future research in this field. Objective This paper is aimed at identifying and critically analysing data exfiltration attack vectors and countermeasures for reporting the status of the art and determining gaps for future research. Method We have followed a structured process for selecting 108 papers from seven publication databases. Thematic analysis method has been applied to analyse the extracted data from the reviewed papers. Results We have developed a classification of (1) data exfiltration attack vectors used by external attackers and (2) the countermeasures in the face of external attacks. We have mapped the countermeasures to attack vectors. Furthermore, we have explored the applicability of various countermeasures for different states of data (i.e., in use, in transit, or at rest). Conclusion This review has revealed that (a) most of the state of the art is focussed on preventive and detective countermeasures and significant research is required on developing investigative countermeasures that are equally important; (b) Several data exfiltration countermeasures are not able to respond in real-time, which specifies that research efforts need to be invested to enable them to respond in real-time (c) A number of data exfiltration countermeasures do not take privacy and ethical concerns into consideration, which may become an obstacle in their full adoption (d) Existing research is primarily focussed on protecting data in ‘in use’ state, therefore, future research needs to be directed towards securing data in ‘in rest’ and ‘in transit’ states (e) There is no standard or framework for evaluation of data exfiltration countermeasures. We assert the need for developing such an evaluation framework.
机译:AbstractContext网络攻击的主要目标之一是数据exfiltration,这是敏感或私人数据泄漏到未经授权的实体。数据exfiltration可以由局外人或一个组织的内幕人员犯下。考虑到越来越多的数据exfiltration事件,已经开发了大量数据的exfiltration对策。这些对策旨在检测,预防或调查敏感或私人数据的抗火。随着对数据的兴趣越来越令人兴趣,重要的是要审查数据exfiltration攻击向量和对策,以支持该领域的未来研究。目的本文旨在识别和批判性分析数据exfiltration攻击向量及对策,以报告艺术现状和确定未来研究的差距。方法我们遵循了一个结构化的过程,用于从七个出版物数据库中选择108篇论文。专题分析方法已应用于分析来自审查的论文的提取数据。结果我们开发了(1)数据exfiltration攻击向量的分类,并由外部攻击者使用的(2)面对外部攻击的对策。我们已经映射了攻击向量的对策。此外,我们已经探讨了各种数据的各种对策的适用性(即,在使用中,在运输过程中,或休息)。结论本综述已透露(a)本领域的大多数国家集中于预防性和侦探对策,并在制定同样重要的调查对策时需要进行重大研究; (b)若干数据exfiltration对策无法实时响应,这指定需要投入研究努力,使其能够实时响应(c)许多数据exfiltration对策不采取隐私和伦理考虑的担忧,这可能成为完全采用的障碍(d)现有研究主要集中在“使用”状态下的数据保护,因此,未来的研究需要指导在“休息”和“中”确保数据过境“州(e)没有标准或框架,用于评估数据的抗污染对策。我们断言需要开发此类评估框架。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号