skip to main content
10.1145/2810103.2810131acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
poster

POSTER: WinOver Enterprise Dark Data

Published:12 October 2015Publication History

ABSTRACT

Any persistent untagged, untapped and unclassified data can be termed as dark data. It has two common traits: first, it is not possible to determine its worth, and second, in most of the scenarios it is inadequately protected. Previous work and existing solutions are restricted to cater single node system. Moreover, they perform specialized processing of selected content, for example, logs. Further, there is total negligence of stakeholders and minimal focus on the data getting generated within the enterprise. From the perspective of an enterprise it is important to understand the distribution, nature and worth of dark data, as it helps in choosing right security controls, insurance or steps needed to pre-process a system before discarding it. In this paper we demonstrate a distributed system, called File WinOver, for File Lifecycle Management (FLM). The solution operates in a distributed environment where it identifies the dormant and active files on a system, filters them as per requirement and computes their fingerprint. Moreover, the content fingerprinting is utilized to detect closed user groups. After which, it classifies the content based on configured policies, and maps them with the stakeholders. This mapping is further used for valuating the risk exposure of the file. Thus, our system helps in identifying dark data and assigns quantitative risk value.

References

  1. Types of data breaches in 2014. https://www.privacyrights.org/data-breach/new. {Online; accessed 10-July-2015}.Google ScholarGoogle Scholar
  2. loggly - log management tool. https://www.loggly.com/.Google ScholarGoogle Scholar
  3. Young et al. Detecting unknown insider threat scenarios. In Security and Privacy Workshops (SPW), 2014 IEEE, pages 277--288. IEEE, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Gates et al. Detecting insider information theft using features from file access logs. In Computer Security-ESORICS 2014, pages 383--400. Springer, 2014.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Chen et al. Detection of anomalous insiders in collaborative environments via relational analysis of access logs. In Proceedings of the first ACM conference on Data and application security and privacy, pages 63--74. ACM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Beaver et al. An approach to the automated determination of host information value. In Computational Intelligence in Cyber Security (CICS), 2011 IEEE Symposium on, pages 92--99. IEEE, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  7. Park et al. Estimating asset sensitivity by profiling users. In Computer Security--ESORICS 2013, pages 94--110. Springer, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  8. Park et al. System for automatic estimation of data sensitivity with applications to access control and other applications. In Proceedings of the 16th ACM symposium on Access control models and technologies, pages 145--146. ACM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. OWASP Risk Rating Methodology. https://www.owasp.org/index.php/OWASP_Risk_Rating_Methodology/.Google ScholarGoogle Scholar

Index Terms

  1. POSTER: WinOver Enterprise Dark Data

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            CCS '15: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security
            October 2015
            1750 pages
            ISBN:9781450338325
            DOI:10.1145/2810103

            Copyright © 2015 Owner/Author

            Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 12 October 2015

            Check for updates

            Qualifiers

            • poster

            Acceptance Rates

            CCS '15 Paper Acceptance Rate128of660submissions,19%Overall Acceptance Rate1,261of6,999submissions,18%

            Upcoming Conference

            CCS '24
            ACM SIGSAC Conference on Computer and Communications Security
            October 14 - 18, 2024
            Salt Lake City , UT , USA

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader