skip to main content
10.1145/2459976.2459995acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

Tailoring trusted semantic information

Published: 08 January 2013 Publication History

Abstract

Tailored trusted spaces (TTS) need to identify data sensitive to user context and ensure sensitive data is not leaked. This task is similar to Data Leak Prevention (DLP) solutions, which monitor and control corporate data flow. Current DLP techniques find data that matches user defined syntactic patterns [1, 2]. However, user context is usually described by information semantics, rather than data syntax. In this paper, we propose a method which extracts semantic features from a small number of training documents describing user context, and use the presence of these semantic features to decide whether an input document contains sensitive information or not. Test results from three document sets show the proposed method giving 96%, 90%, 75% true positive and 3%, 14%, 26% false positive rates.

References

[1]
A. Shabtai, Y. Elovici, and L. Rokach, A Survey of Data Leakage Detection and Prevention Solutions. Springer, 2012.
[2]
RSA DLP Solution. {Online}. Available: http://www.emc.com/security/rsa-data-loss-prevention.htm
[3]
"Trustworthy cyberspace: Strategic plan for the federal cybersecurity research and development program."
[4]
A. Lee and T. Brewer, "Smart grid cyber security strategy and requirements, draft nistir 7628," NIST, 2009.
[5]
S. Al-Fedaghi, "A conceptual foundation for data loss prevention," System, vol. 16, p. 17, 2011.
[6]
"Machine learning sets new standard for data loss prevention." {Online}. Available: http://eval.symantec.com/mktginfo/enterprise/white_papers/b-dlp_machine_learning.WP_en-us.pdf
[7]
S. Dumais, "Latent semantic analysis," Annual Review of Information Science and Technology, vol. 38, no. 1, pp. 188--230, 2004.
[8]
T. Landauer, P. Foltz, and D. Laham, "An introduction to latent semantic analysis," Discourse processes, vol. 25, pp. 259--284, 1998.
[9]
P. Wiemer-Hastings and I. Zipitria, "Rules for syntax, vectors for semantics," in Proceedings of CSS 01, 2001, pp. 1112--1117.
[10]
J. Steinberger and K. Ježek, "Text summarization and singular value decomposition," Advances in Information Systems, pp. 245--254, 2005.
[11]
K. Zhou, J. Doyle, K. Glover et al., Robust and optimal control. Prentice Hall Upper Saddle River, NJ, 1996.
[12]
J. Tesic, "Evaluating a class of dimensionality reduction algorithms."

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
CSIIRW '13: Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop
January 2013
282 pages
ISBN:9781450316873
DOI:10.1145/2459976

Sponsors

  • Los Alamos National Labs: Los Alamos National Labs
  • Sandia National Labs: Sandia National Laboratories
  • DOE: Department of Energy
  • Oak Ridge National Laboratory
  • Lawrence Livermore National Lab.: Lawrence Livermore National Laboratory
  • BERKELEYLAB: Lawrence National Berkeley Laboratory
  • Argonne Natl Lab: Argonne National Lab
  • Idaho National Lab.: Idaho National Laboratory
  • Pacific Northwest National Laboratory
  • Nevada National Security Site: Nevada National Security Site

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 January 2013

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Funding Sources

Conference

CSIIRW '13
Sponsor:
  • Los Alamos National Labs
  • Sandia National Labs
  • DOE
  • Lawrence Livermore National Lab.
  • BERKELEYLAB
  • Argonne Natl Lab
  • Idaho National Lab.
  • Nevada National Security Site
CSIIRW '13: Cyber Security and Information Intelligence
January 8 - 10, 2013
Tennessee, Oak Ridge, USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 118
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media