Sistemy i Sredstva Informatiki [Systems and Means of Informatics]
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive
Impact factor

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Sistemy i Sredstva Inform.:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Sistemy i Sredstva Informatiki [Systems and Means of Informatics], 2022, Volume 32, Issue 2, Pages 72–80
DOI: https://doi.org/10.14357/08696527220207
(Mi ssi828)
 

Some approaches to network DLP analysis

A. A. Grushoa, N. A. Grushoa, M. I. Zabezhailoa, D. V. Smirnovb, E. E. Timoninaa, S. Ya. Shorgina

a Federal Research Center "Computer Science and Control" of the Russian Academy of Sciences, 44-2 Vavilov Str., Moscow 119133, Russian Federation
b Sberbank of Russia, 19 Vavilov Str., Moscow 117999, Russian Federation
References:
Abstract: The work deals mainly with network DLP (Data Lost/Leakage Prevention) systems. One of the main tasks of DLP systems is to recognize the appearance of valuable information that can appear on the network at the output of the computer system. Network-based DLP systems are becoming more important due to the development of remote work of employees of various organizations. The proper functioning of the DLP is determined by recognizing short messages as random sequences and leaking valuable information such as personal data as a short sequence satisfying structural constraints. The main problem of these methods is false alarms. In the work, in the simplest models, the volume of data is estimated in which it is possible to search for valuable information at small probabilities of false alarms. The examples of simple but fast methods for detecting leaks of valuable information are built. The methods are divided by complexity and their applications. Such methods can be used not only to analyze DLP systems, but also to search for service inserts and signals during the transfer of information when searching and analyzing poorly protected or unprotected personal data where depersonalization is required according to the rules. The estimates of the probabilities of false alarms are built.
Keywords: information security, DLP systems, estimates of probabilities of false alarms.
Received: 22.03.2022
Document Type: Article
Language: Russian
Citation: A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, D. V. Smirnov, E. E. Timonina, S. Ya. Shorgin, “Some approaches to network DLP analysis”, Sistemy i Sredstva Inform., 32:2 (2022), 72–80
Citation in format AMSBIB
\Bibitem{GruGruZab22}
\by A.~A.~Grusho, N.~A.~Grusho, M.~I.~Zabezhailo, D.~V.~Smirnov, E.~E.~Timonina, S.~Ya.~Shorgin
\paper Some approaches to network DLP analysis
\jour Sistemy i Sredstva Inform.
\yr 2022
\vol 32
\issue 2
\pages 72--80
\mathnet{http://mi.mathnet.ru/ssi828}
\crossref{https://doi.org/10.14357/08696527220207}
Linking options:
  • https://www.mathnet.ru/eng/ssi828
  • https://www.mathnet.ru/eng/ssi/v32/i2/p72
  • Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Системы и средства информатики
    Statistics & downloads:
    Abstract page:425
    Full-text PDF :45
    References:14
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024