• 제목/요약/키워드: Information Leakage

검색결과 1,515건 처리시간 0.025초

New Approach for Detecting Leakage of Internal Information; Using Emotional Recognition Technology

  • Lee, Ho-Jae;Park, Min-Woo;Eom, Jung-Ho;Chung, Tai-Myoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권11호
    • /
    • pp.4662-4679
    • /
    • 2015
  • Currently, the leakage of internal information has emerged as one of the most significant security concerns in enterprise computing environments. Especially, damage due to internal information leakage by insiders is more serious than that by outsiders because insiders have considerable knowledge of the system's identification and password (ID&P/W), the security system, and the main location of sensitive data. Therefore, many security companies are developing internal data leakage prevention techniques such as data leakage protection (DLP), digital right management (DRM), and system access control, etc. However, these techniques cannot effectively block the leakage of internal information by insiders who have a legitimate access authorization. The security system does not easily detect cases which a legitimate insider changes, deletes, and leaks data stored on the server. Therefore, we focused on the insider as the detection target to address this security weakness. In other words, we switched the detection target from objects (internal information) to subjects (insiders). We concentrated on biometrics signals change when an insider conducts abnormal behavior. When insiders attempt to leak internal information, they appear to display abnormal emotional conditions due to tension, agitation, and anxiety, etc. These conditions can be detected by the changes of biometrics signals such as pulse, temperature, and skin conductivity, etc. We carried out experiments in two ways in order to verify the effectiveness of the emotional recognition technology based on biometrics signals. We analyzed the possibility of internal information leakage detection using an emotional recognition technology based on biometrics signals through experiments.

네트워크 트래픽 특성을 이용한 개인정보유출 탐지기법 (Detection of Personal Information Leakage using the Network Traffic Characteristics)

  • 박정민;김은경;정유경;채기준;나중찬
    • 정보처리학회논문지C
    • /
    • 제14C권3호
    • /
    • pp.199-208
    • /
    • 2007
  • 유비쿼터스 네트워크 환경에서 개인정보의 유출은 다양한 사이버 범죄를 야기하며 개인정보의 상품화로 프라이버시의 침해가 증가하므로 개인정보의 유출을 탐지하는 것은 매우 중요하다. 본 논문은 네트워크의 트래픽 특성을 기반으로 한 개인정보 유출 탐지 기법을 제안하고자 한다. 실제 대학망에서 정상 상태의 트래픽을 수집하여 트래픽의 특성을 분석함으로써 네트워크 트래픽이 자기유사성을 지님을 확인하였다. 개인정보의 유출을 시도하는 악성코드의 사전정보수집단계를 모사한 비정상적인 트래픽에 대하여 정상 트래픽에서의 자기유사성과의 변화를 살펴봄으로써 이상을 조기 감지할 수 있었다.

A System for Improving Data Leakage Detection based on Association Relationship between Data Leakage Patterns

  • Seo, Min-Ji;Kim, Myung-Ho
    • Journal of Information Processing Systems
    • /
    • 제15권3호
    • /
    • pp.520-537
    • /
    • 2019
  • This paper proposes a system that can detect the data leakage pattern using a convolutional neural network based on defining the behaviors of leaking data. In this case, the leakage detection scenario of data leakage is composed of the patterns of occurrence of security logs by administration and related patterns between the security logs that are analyzed by association relationship analysis. This proposed system then detects whether the data is leaked through the convolutional neural network using an insider malicious behavior graph. Since each graph is drawn according to the leakage detection scenario of a data leakage, the system can identify the criminal insider along with the source of malicious behavior according to the results of the convolutional neural network. The results of the performance experiment using a virtual scenario show that even if a new malicious pattern that has not been previously defined is inputted into the data leakage detection system, it is possible to determine whether the data has been leaked. In addition, as compared with other data leakage detection systems, it can be seen that the proposed system is able to detect data leakage more flexibly.

Method to Analyze Information Leakage Malware using SSL Communication in Android Platform

  • Cho, Gilsu;Kim, Sangwho;Ryou, Jaecheol
    • 인터넷정보학회논문지
    • /
    • 제19권3호
    • /
    • pp.1-6
    • /
    • 2018
  • Widely used around the world, smartphones contain many features and can store content such as contacts, photos, and videos. Information that can be leaked in proportion to the information that the smartphone can store has also been increased. In recent years, accidents such as personal information leakage have occurred frequently. Personal information leakage is happening in the Android environment, which accounts for more than half of the smartphone operating system market share. Analyzing malicious apps that leak information can tell you how to prevent information leakage. Malicious apps that leak information will send importantinformation to the hacker's (C & C) server, which will use network communication. Malicious apps that are emerging nowadays encrypt and transmit important information through SSL communication. In this case, it is difficult to knowwhat kind of information is exposed to network. Therefore, we suggest a method to analyze malicious apps when leak important information through SSL communication. In this paper, we identify the way malicious apps leak information. And we propose a method for analyzing information leaked by SSL communication. Data before encryption was confirmed in the device through SSL hooking and SSL Strip method.

Piosk : A Practical Kiosk To Prevent Information Leakage

  • Lee, Suchul;Lee, Sungil;Oh, Hayoung;Han, Seokmin
    • International journal of advanced smart convergence
    • /
    • 제8권2호
    • /
    • pp.77-87
    • /
    • 2019
  • One of important concerns in information security is to control information flow. It is whether to protect confidential information from being leaked, or to protect trusted information from being tainted. In this paper, we present Piosk (Physical blockage of Information flow Kiosk) that addresses both the problems practically. Piosk can forestall and prevent the leakage of information, and defend inner tangible assets against a variety of malwares as well. When a visitor who carries a re-writable portable storage device, must insert the device into Piosk installed next to the security gate. Then, Piosk scans the device at the very moment, and detects & repairs malicious codes that might be exist. After that, Piosk writes the contents (including sanitized ones) on a new read-only portable device such as a compact disk. By doing so, the leakage of internal information through both insiders and outsiders can be prevented physically. We have designed and prototyped Piosk. The experimental verification of the Piosk prototype implementation reveals that, Piosk can accurately detect every malware at the same detection level as Virus Total and effectively prevent the leakage of internal information. In addition, we compare Piosk with the state-of-the-art methods and describe the special advantages of Piosk over existing methods.

Analysis of the Effect of Coherence Bandwidth on Leakage Suppression Methods for OFDM Channel Estimation

  • Zhao, Junhui;Rong, Ran;Oh, Chang-Heon;Seo, Jeongwook
    • Journal of information and communication convergence engineering
    • /
    • 제12권4호
    • /
    • pp.221-227
    • /
    • 2014
  • In this paper, we analyze the effect of the coherence bandwidth of wireless channels on leakage suppression methods for discrete Fourier transform (DFT)-based channel estimation in orthogonal frequency division multiplexing (OFDM) systems. Virtual carriers in an OFDM symbol cause orthogonality loss in DFT-based channel estimation, which is referred to as the leakage problem. In order to solve the leakage problem, optimal and suboptimal methods have already been proposed. However, according to our analysis, the performance of these methods highly depends on the coherence bandwidth of wireless channels. If some of the estimated channel frequency responses are placed outside the coherence bandwidth, a channel estimation error occurs and the entire performance worsens in spite of a high signal-to-noise ratio.

개선된 통합모니터링 시스템 설계 및 구축 (Improved Integrated Monitoring System Design and Construction)

  • 전병진;윤덕병;신승수
    • 융합정보논문지
    • /
    • 제7권1호
    • /
    • pp.25-33
    • /
    • 2017
  • 기업에서는 정보유출을 막기 위해 방화벽, DLP 기능의 개별 보안시스템과 통합모니터링 시스템을 구축하여 내부직원에 의한 정보유출을 상시 모니터링하고 있다. 특히 통합모니터링 시스템의 많은 로그 데이터 때문에 시간과 금전적인 비용이 많이 발생하고 있으며, 시스템 속도 저하로 인해 빠른 정보유출 인원을 감지하기 힘들다. 빠른 정보유출 감지를 위해 대용량의 로그 데이터를 일자별, 개인별로 수치화하여 시스템 속도를 빠르게 할 필요가 있다. 그리고 정보유출 징후 인원에 대한 지속적인 모니터링 프로그램을 개발해서 관리할 필요성이 있다.

Minimal Leakage Pattern Generator

  • 김경기
    • 한국산업정보학회논문지
    • /
    • 제16권5호
    • /
    • pp.1-8
    • /
    • 2011
  • This paper proposes a new input pattern generator for minimal leakage power in the nanometer CMOS technology considering all the leakage current components (sub-threshold leakage, gate tunneling leakage, band-to-band tunneling leakage). Using the accurate macro-model, a heuristic algorithm is developed to generate a input pattern for the minimum leakage. The algorithm applies to ISCAS85 benchmark circuits, and the results are compared with the results of Hspice. The simulation result shows that our method's accuracy is within a 5% difference of the Hspice simulation results. In addition, the simulation time of our method is far faster than that of the Hspice simulation.

중소기업 산업기술 유출방지를 위한 정보보호 관리체계 설계 (The Design of Information Security Management System for SMEs Industry Technique Leakage Prevention)

  • 장항배
    • 한국멀티미디어학회논문지
    • /
    • 제13권1호
    • /
    • pp.111-121
    • /
    • 2010
  • 중소기업들은 산업기술 유출방지에 필요성을 인식하여 많은 예산을 들여 정보보호 시스템을 구축하고 있으나, 정보보호 전담조직을 구성하여 통합적인 정보보호 관리체계에 따라 일관성 있는 정보보호 시스템을 구축하지 못하고 특정시스템의 단발성 도입이 이루어지고 있다. 본 연구에서는 중소기업 산업기술 유출현황 조사결과를 바탕으로 대기업과 차별된 중소기업 산업기술 유출방지를 위한 정보보호 관리체계를 설계하고 하였다. 세부적으로 중소기업 산업기술 유출현황 및 취약점 등에 관한 사례를 분석하여 정리하고, 델파이 방법을 적용하여 중소기업 산업기술 유출방지 관리체계를 설계한 다음 이에 대한 적합성을 검증하였다. 본 연구의 결과를 활용하여 중소기업은 적정한 정보보호 투자수준을 산정하고 이에 대한 통제도구를 개발할 수 있을 것으로 기대된다.

개인정보 유출 사고 시 정보보호 기업의 주가 변동에 관한 연구 (A Study on the Stock Price Fluctuation of Information Security Companies in Personal Information Leakage)

  • 김민정;허남길;유진호
    • 정보보호학회논문지
    • /
    • 제26권1호
    • /
    • pp.275-283
    • /
    • 2016
  • 현재 우리나라의 인터넷과 IT 인프라는 세계 최고 수준을 유지하고 있다. 그러나 그 이면에는 보안사고, 특히 개인정보 유출 사고가 빈번히 발생하고 있다. 개인정보 유출 사고 발생 시 해당 기업은 부정적 영향을 받게 되며, 이를 방지하기 위해 정보보호 업체의 다양한 보안 솔루션을 사용하고 있다. 따라서 개인정보 유출 사고 발생 시 발생 기업은 물론 기업에 보안 솔루션을 제공하는 정보보호 업체에도 영향을 미칠 것으로 생각된다. 이에 본 논문에서는 개인정보 유출 사고 발생 시 정보보호 업체의 주가 변화를 통해 보안 이벤트가 정보보호 업체의 가치에 어떠한 영향을 주는지 가설을 세워 검증하였다. 그 결과 개인정보 유출 사고 발생 시 정보보호 업체의 주가는 상승하였으며, 사고 규모, 사고 발생 업종에 따른 차이는 통계적으로 유의하지 않았고, 정보보호 업체의 업태 구분에 따른 차이가 존재하였다.