Browse > Article
http://dx.doi.org/10.13089/JKIISC.2020.30.5.957

A Study on Development of Internal Information Leak Symptom Detection Model by Using Internal Information Leak Scenario & Data Analytics  

Park, Hyun-Chul (Samil PwC)
Park, Jin-Sang (KISA)
Kim, Jungduk (Chung-Ang University)
Abstract
According to the recent statistics of the National Industrial Security Center, about 80% of the confidential leak are caused by former and current employees in the case of domestic confidential leak accidents. Most of the information leak incidents by these insiders are due to poor security management system and information leak detection technology. Blocking confidential leak of insiders is a very important issue in the corporate security sector, but many previous researches have focused on responding to intrusions by external threats rather than by insider threats. Therefore, in this research, we design an internal information leak scenario to effectively and efficiently detect various abnormalities occurring in the enterprise, analyze the key indicators of the leak symptoms derived from the scenarios by using data analytics and propose a model that accurately detects leak activities.
Keywords
Internal information leak; scenario; data analytics; anomaly detection; risk indicators;
Citations & Related Records
Times Cited By KSCI : 5  (Citation Analysis)
연도 인용수 순위
1 Gi-Hyouk Lee and Cheol-Gyu Lee. "A Study on the Construction of Leak Prevention System through Analysis of Internal Information Leak Symptom." Journal of The Korea Institute of Information Security & Cryptology, 19(3). pp. 70-79. Jun. 2009
2 National Industrial Security Center, http://service12.nis.go.kr
3 Hyun-Tak Chae, "Security policy proposals through PC security solution log analysis : prevention leakage of personal information," master's thesis, Korea University, Feb. 2015.
4 Jung-Ho Eom, "The Quantitative Evaluation of a Level of Insider Activity using SFI Analysis Techniques," Journal of security engineering, 10(2), pp. 113-122, Apr. 2013
5 Kwang-Woo Lee and Seung-Joo Kim. "Analysis of Trends in Digital Multifunction Device Security Technology from the Viewpoint of Preventing and Protecting Business Confidential Information." Journal of The Korea Institute of Information Security & Cryptology, 20(1). pp. 47-55. Feb. 2010
6 Gui-Young Jung, "A Study on the Effective User Anomaly Detection Method through Integrated Security Log Analysis," master's thesis, Yonsei University, Feb. 2017.
7 Jang-Su Park and Im-Yeong Lee, "Information Security : Log Analysis Method of Separate Security Solution using Single Data Leakage Scenario," KIPS Transactions on Computer and Communication Systems, 4(2), pp. 65-72, Feb. 2015   DOI
8 Eun-Seon Kim, "A Study on the Anomaly Detection using User Log : ERP System An Empirical Study," master's thesis, Korea University, Feb. 2015.
9 Jae-Hyouk Choi, "A Study on A Scenarios Development Guideline for Detecting Security Threats," master's thesis, Korea National Open University, Feb. 2016.
10 Won-Gi Lim, Koo-Hyung Kwon, Jung-Jae Kim, Jong-Eon Lee and Si-Ho Cha, "Comparison and Analysis of Anomaly Detection Methods for Detecting Data Exfiltration," Journal of Korea Academia-Industrial cooperation Society, 17(9), pp. 440-446, Sep. 2016   DOI
11 Dong-Wook Ha, Ki-Tae Kang and Yeong-Seung Ryu, "Detecting Insider Threat Based on Machine Learning : Anomaly Detection Using RNN Autoencoder," Journal of The Korea Institute of Information Security & Cryptology, 27(4), pp. 763-773, Aug. 2017   DOI
12 Sung-Man Park and Choong-Kyo Jeong, "Enterprise Data Loss Prevention Using Behavior-Based Outlier Detection," Proceedings of Symposium of the Korean Institute of Communications and Information Sciences, pp. 94-95, Nov. 2016
13 Kwon-Ill Kim and Byoung-Tak Zhang, "Hybrid Product of Experts Model and Learning Algorithm for Anomaly Detection," Proceedings of Conference of the Korean Institute of Information Scientists and Engineers, pp. 1553-1555, Jun. 2013