期刊文献+

Empirical Evaluation of Information Leakage Detection Using Net-flow Analysis

Empirical Evaluation of Information Leakage Detection Using Net-flow Analysis
下载PDF
导出
摘要 Because of the widespread of Trojans,organizations and Internet users become more vulnerable to the threat of information leakage.This paper describes an information leakage detection system( ILDS) to detect sensitive information leakage caused by Trojan.In particular,the principles of the system are based on the analysis of net-flows in four perspectives: heartbeat behavior analysis,DNS abnormal analysis,uploaddownload ratio and content analysis.Heartbeat behavior analysis and DNS abnormal analysis are used to detect the existence of Trojans while upload-download ratio and content analysis can quickly detect when the information leakage happens.Experiments indicate that the system is reliable and efficient in detecting information leakage.The system can also help to collect and preserve digital evidence when information leakage incident occurs. Because of the widespread of Trojans,organizations and Internet users become more vulnerable to the threat of information leakage.This paper describes an information leakage detection system( ILDS) to detect sensitive information leakage caused by Trojan.In particular,the principles of the system are based on the analysis of net-flows in four perspectives: heartbeat behavior analysis,DNS abnormal analysis,uploaddownload ratio and content analysis.Heartbeat behavior analysis and DNS abnormal analysis are used to detect the existence of Trojans while upload-download ratio and content analysis can quickly detect when the information leakage happens.Experiments indicate that the system is reliable and efficient in detecting information leakage.The system can also help to collect and preserve digital evidence when information leakage incident occurs.
出处 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2014年第6期16-21,共6页 哈尔滨工业大学学报(英文版)
基金 Sponsored by the National Natural Science Foundation of China(Grant No.61272500) the National High Technology Research and Development Program of China(Grant No.2011AA010701)
关键词 information leakage heartbeat behavior Trojan detection digital forensics information leakage heartbeat behavior Trojan detection digital forensics
  • 相关文献

参考文献11

  • 1McAfee. Unsecured Economies: Protecting Vital Information. Santa Clara:McMee. 2009.
  • 2Wikipedia. Zeus (Trojan horse), http://en.wikipedia.org/ wiki/Zeus (Trojan horse). 2014-11-27.
  • 3Mjolsnes S. Digital forensics research. Telektronikk, 2005, 1:92-97.
  • 4Cohen F. Reply to comment on a framework for modeling Trojans and computer virus infection. The Computer Jouranl, 2001,44(4): 326-327.
  • 5Symantec Corporation. Data loss prevention: Products and services, Mountain View, California. www. symantec, corn/ businesss/theme.jsp? themei-d = vontu.
  • 6Sky Corporation. SKYSEA Client View. Osaka. www. sky seaclientview.net.
  • 7Kida K, Sakamoto H, Shimazu H, et al. InfoCage: a development and evaluation of confidential file lifetime monitoring technology by analyzing events from file systems and GUIs. Proceedings of the Second International Workshop on Security. Berlin : Springer-Verlag, 2007. 246- 261.
  • 8Nakayama Y, Shibaguchi S, Okada K. A visualization system for analyzing information leakage. Advances in Digital ForensicsVI, IFIPAICT 337. Berlin:Springer.2010. 269-282.
  • 9Wikipedia. CreyPigeon ( Trojan horse ). http ://zh. wikipedia. org/wiki/%E7%81% B0%E9%B8% BD% E5% AD%90. 2014- 08-18.
  • 10PCShare. PCShare ( Trojan horse), http://www, hudong. com/wiki/Pcshare. 2012-10-18.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部