2020
DOI: 10.11591/ijece.v10i4.pp3615-3622
|View full text |Cite
|
Sign up to set email alerts
|

Data loss prevention (DLP) by using MRSH-v2 algorithm

Abstract: Sensitive data may be stored in different forms. Not only legal owners but also malicious people are interesting of getting sensitive data. Exposing valuable data to others leads to severe Consequences. Customers, organizations, and /or companies lose their money and reputation due to data breaches. There are many reasons for data leakages. Internal threats such as human mistakes and external threats such as DDoS attacks are two main reasons for data loss. In general, data may be categorized based into three k… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…They provide real-time monitoring and alerts, enabling banks to respond quickly to cyber threats. Data Loss Prevention (DLP) tools [67] DLP tools monitor and prevent the unauthorized transmission of sensitive data, both within and outside the organization.…”
Section: Securitymentioning
confidence: 99%
“…They provide real-time monitoring and alerts, enabling banks to respond quickly to cyber threats. Data Loss Prevention (DLP) tools [67] DLP tools monitor and prevent the unauthorized transmission of sensitive data, both within and outside the organization.…”
Section: Securitymentioning
confidence: 99%
“…Considering this literature, many ensemble approaches have been suggested in recent works to address the problems with single classifiers [35]- [37]. Therefore, highly scalable and voting-based ensemble models were proposed [38]- [40]. These models can be used in real-time to successfully examine network traffic and proactively warn against the possibility of attacks [41]- [43].…”
Section: Figure 2 Overview Of Grey Hole Attack [19]mentioning
confidence: 99%
“…In [35] DRM systems are compared with the proposed DLPS (UC4Win). In [36] the authors reveal some of the problems to control the use of such data [20], [21]. The security mechanisms can be content deletion, content editing, content reading, or an authorized user to perform each operation.…”
Section: Drm For Document Protectionmentioning
confidence: 99%
“…If a match is detected between the values, a leak is detected by the system. This approach presents the problem that any modification of the original document may result in a completely different hash value, which would not allow the system to detect the confidential document [20].…”
Section: Hashmentioning
confidence: 99%
See 1 more Smart Citation