期刊文献+

数据泄漏防御算法的研究 被引量:3

Research on data leakage prevention algorithm
下载PDF
导出
摘要 以保证企业信息资产的安全为目标,基于Karp-Rabin算法,提出了一种新的数据泄漏防御算法。该算法对被防御的数据和欲送出系统的数据进行矩阵求解,生成各自的指纹,并将两者的指纹进行匹配,如果两者的相似度达到预定值则对数据流进行拦截。仿真实验结果表明,这种以指纹模式来匹配文件的数据泄漏防御方法能以较少的资源消耗完成对资源的监控过程,比全文匹配方法具有更高的效率。可以预见,把该算法嵌入相应的监视系统中将能有效地防止企业数据的泄漏。 To ensure the security of enterprises' information, based on the Karp-Rabin' s algorithm, this paper proposed a new algorithm of data leakage prevention. This algorithm generated fingerprints for both the defense data and the data being sent out by solving data matrix, and compares them. If the similarity between them was as high as the expected value, the data flow would be intercepted. Simulation results have shown that this algorithm can complete the resources monitoring process with less resources consumption, and it has higher efficiency than full text matching. It can be foreseen that the algorithm can be deployed in monitoring system to effectively prevent enterprises' data leakage.
作者 李玲娟 张睿
出处 《计算机应用研究》 CSCD 北大核心 2009年第11期4279-4281,共3页 Application Research of Computers
基金 国家"863"计划资助项目(2006AA01Z439) 江苏省高校自然科学基础研究项目(08KJB620002) 南京邮电大学校科研基金资助项目(NY207051)
关键词 安全 数据泄漏 防御 security data leakage prevention
  • 相关文献

参考文献7

  • 1ANDERSON E,ARLITT M. Full packet capture and oflline analysis, Technical Report HPL-2006-156[ R]. 2006. 被引量:1
  • 2BRODER A. Some applications of Rabin' s fingerprinting method [ C ]//Proc of Methods in Communications, Security and Computer Science. [ S. l. ] : Springer-Verlag, 1993 : 143-152. 被引量:1
  • 3SCHLEIMER S, DANIEL, AIKEN A. Winnowing: local algorithms for document fingerprinting [ C ]//Prec of ACM SIGMOD International Conference on Management of Data. 2003 : 76-85. 被引量:1
  • 4CHEN Jian-sheng, MOON Y S. A minut/ae-based fingerprint individuality model [ C]//Proc of IEEE Conference on Computer Vision and Pattern Recognition. 2007:1-7. 被引量:1
  • 5LINDOSO A, ENTRENA L, LIU-JIMENEZ J,et al. Increasing security with correlation-based fingerprint matching[ C]//Proc of the41st Annual IEEE International Camahan Conference on Security Technology. 2007:37-43. 被引量:1
  • 6NISBET J. The security role for content analysis[ R]. California:Company TABLUS ,2004. 被引量:1
  • 7CHO C Y,LEE S Y,TAN C P, et al. Network forensics on packet finngerprints [ C ]//Proc of the 21st IFIP Information Security Conference ( SEC 2006). Karlstad: [ s. n. ] ,2006:401-412. 被引量:1

同被引文献46

引证文献3

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部