Insider Information Leakage Detection Method using Scenario Technique

2020 ◽  
Vol 21 (3) ◽  
pp. 617-626
Author(s):  
Ju Young Lee ◽  
Goo Yeon Lee ◽  
Ho Yeol Kwon
2020 ◽  
pp. 1-12
Author(s):  
Jian Mao ◽  
Jinming Liu ◽  
Jiemin Zhang ◽  
Zhenzhong Han ◽  
Sen Shi

The unintentional electromagnetic (EM) emission of computer monitors may cause the leakage of image information displayed on the monitor. Detection of EM information leakage risk is significant for the information security of the monitor. The traditional detection method is to verify EM information leakage by reconstructing an image from EM emission. The detection method based on image reconstruction has limitations: adequate signal sampling rate, accurate synchronization signal, and dependence on operational experience. In this paper, we analyze the principle of image information leakage and propose an innovative detection method based on Convolutional Neural Network (CNN). This method can identify the image information in EM emission to verify the EM information leakage risk of the monitor. It overcomes the limitations of the traditional method with machine learning. This is a new attempt in the field of EM information leakage detection. Experimental results show that it is more adaptable and reliable in complex detection environment.


2020 ◽  
Vol 140 (5) ◽  
pp. 409-414
Author(s):  
Masaru Tatemi ◽  
Hisao Inami ◽  
Toshiaki Rokunohe ◽  
Makoto Hirose

Author(s):  
K. S. Wagh

Data is an important property of various organizations and it is intellectual property of organization. Every organization includes sensitive data as customer information, financial data, data of patient, personal credit card data and other information based on the kinds of management, institute or industry. For the areas like this, leakage of information is the crucial problem that the organization has to face, that poses high cost if information leakage is done. All the more definitely, information leakage is characterize as the intentional exposure of individual or any sort of information to unapproved outsiders. When the important information is goes to unapproved hands or moves towards unauthorized destination. This will prompts the direct and indirect loss of particular industry in terms of cost and time. The information leakage is outcomes in vulnerability or its modification. So information can be protected by the outsider leakages. To solve this issue there must be an efficient and effective system to avoid and protect authorized information. From not so long many methods have been implemented to solve same type of problems that are analyzed here in this survey.  This paper analyzes little latest techniques and proposed novel Sampling algorithm based data leakage detection techniques.


2011 ◽  
Vol 393-395 ◽  
pp. 1018-1023
Author(s):  
Hong Li Zou

The losing ratio of leakage in the process of water supply is about 10%-30% in total. However, the existing water supply system has no rational planning and distribution. On the other hand, it is growing fast. It is a challenge to check the leakage in whole water supply network. This paper tries to present a solution to ensure that the regional network runs reasonably and safely, which is building a regionalization of the detected model.


Vacuum ◽  
1985 ◽  
Vol 35 (1) ◽  
pp. 61
Author(s):  
Thomas E Adams

Sign in / Sign up

Export Citation Format

Share Document