期刊文献+

一种基于ICAP的实时数据防泄漏方案 被引量:2

A Real Time Data Leakage Prevent System based on ICAP
下载PDF
导出
摘要 文章介绍了现今数据防泄漏技术的研究现状,分析了现有数据防泄漏技术实现的难点和弱点。在前人的基础上提出并改进了一套基于ICAP协议的实时数据防泄漏方案,弥补了现有技术对HTTPS协议流量进行分析检测的困难和对恶意软件通过加密通道盗取敏感数据无法防御的不足。最后搭建实验环境,测试其运行性能,证明了该系统具有一定的实用价值。 This paper introduce nowadays Data Leakage Prevent(DLP) researching. And analysis the challenge and weakness of present DLP techniques. Thanks for the achievements of previous researhers, we design and implement a real time data leakage prevent system based on ICAP. This system makes up for 2 the weaknesses of regular DLP solutions. One is the ability of intercept and analysis HTTPS encrypted data flow, the other one is defending data leakage due to malicious software's custom encrypted tunnel over regular HTTP port. Last of all, we build up the environment and test the average latency of our DLP system which proves it have potential of being put into practise.
出处 《信息网络安全》 2013年第11期49-53,共5页 Netinfo Security
基金 国家自然基金[61070204 61101108]
关键词 数据防泄漏 ICAP 质询响应 透明Web代理 DLP ICAP challenge-response transparent Web proxy
  • 相关文献

参考文献21

  • 1Linode hacked, CCs and passwords leaked[EB/OLJ.http://slashdot.org/ firehose.pl?op =view&type=submission&id=2603667.
  • 2Best Practices for Designing and Managing Your Data Protection / Data Loss Prevention Pro-gram[EB/OL].http://www.mcafee.com/us/ resources/reports/rp-ponemon-data-protection-full.pdf.
  • 3Tore Torsteinbo. Data Loss Prevention Systems and Their Weaknesses [D].Kristiamand and Grimstad, Norway: University of Agder.2012,.
  • 4李玲娟,张睿.数据泄漏防御算法的研究[J].计算机应用研究,2009,26(11):4279-4281. 被引量:3
  • 5Xiaosong Zhang, Research and Application of the Transparent Data Encpryption In Intranet Data Leakage Prevention [J].Computational Intelligence and Security, 2009. CIS '09. International Confer-ence on (Volume:2).376-379.
  • 6P. John, A. Moshchuk, S. D. Gribble, and A. Krishnamurthy. Studying spamming botnets using botlab [J], In USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2009. 291-306.
  • 7R. Perdisci,W.Lee,N.Feamster. Behavioral clus-tering of HTTP-based malware and signature gen-eration using malicious network traces [JJ.In USENIX conference on Networked systems design and implementation (NSDI),2/)10, 26-26.
  • 8Brian Schulte , NetGator: malware detection using program interactive challenges [J],DIMVA'12 Proceedings of the 9th international conference on Detection of Intrusions and Malware, and Vulner-ability Assessment,2013, 164-183.
  • 9李秋洁,茅耀斌,王执铨.CAPTCHA技术综述研究[J].计算机研究与发展,2012,490)469-480.
  • 10程斌.Check Point推出全新数据防泄密方案[J].信息网络安全,2010(7):53-53. 被引量:1

二级参考文献73

  • 1陈立伟,李春燕.一种基于多尺度语义分析的图像识别方法[J].计算机应用研究,2009,26(2):799-800. 被引量:1
  • 2张孝,王珊,彭朝晖.基于安全策略的一种数据保护方法及实现技术[J].计算机科学,2007,34(2):122-124. 被引量:6
  • 3赵勇,刘吉强,韩臻,沈昌祥.信息泄露防御模型在企业内网安全中的应用[J].计算机研究与发展,2007,44(5):761-767. 被引量:29
  • 4ANDERSON E,ARLITT M. Full packet capture and oflline analysis, Technical Report HPL-2006-156[ R]. 2006.
  • 5BRODER A. Some applications of Rabin' s fingerprinting method [ C ]//Proc of Methods in Communications, Security and Computer Science. [ S. l. ] : Springer-Verlag, 1993 : 143-152.
  • 6SCHLEIMER S, DANIEL, AIKEN A. Winnowing: local algorithms for document fingerprinting [ C ]//Prec of ACM SIGMOD International Conference on Management of Data. 2003 : 76-85.
  • 7CHEN Jian-sheng, MOON Y S. A minut/ae-based fingerprint individuality model [ C]//Proc of IEEE Conference on Computer Vision and Pattern Recognition. 2007:1-7.
  • 8LINDOSO A, ENTRENA L, LIU-JIMENEZ J,et al. Increasing security with correlation-based fingerprint matching[ C]//Proc of the41st Annual IEEE International Camahan Conference on Security Technology. 2007:37-43.
  • 9NISBET J. The security role for content analysis[ R]. California:Company TABLUS ,2004.
  • 10CHO C Y,LEE S Y,TAN C P, et al. Network forensics on packet finngerprints [ C ]//Proc of the 21st IFIP Information Security Conference ( SEC 2006). Karlstad: [ s. n. ] ,2006:401-412.

共引文献56

同被引文献22

  • 1黄昆,张大方,谢高岗,金军航.一种面向深度数据包检测的紧凑型正则表达式匹配算法[J].中国科学:信息科学,2010,40(2):356-370. 被引量:12
  • 2谭励,于重重.SOAP协议与应用[J].机械管理开发,2005,20(2):73-74. 被引量:3
  • 3汤昊,李之棠.基于DPI的P2P流量控制系统的设计与实现[J].信息安全与通信保密,2007,29(6):94-96. 被引量:12
  • 4朱永庆.DPI技术应用场景探讨[J].广东通信技术,2007,27(7):27-29. 被引量:11
  • 5IETF RFC 3507 lnternet Content Adaptation Protocol (ICAP) [S/ OL]. [2015-03-01 ]. http://www.ictf.org/rfc/rfc3507.txt.
  • 6Roy Thomas Fielding. Architectural Styles and the Design of Net- work- based Software Architectures [ D 1. USA : University of Califor-nla,2000.
  • 73GPP TS 23.203 Policy and charging control architecture [S/OL].[ 2015-07-22 ]. http : Ilwww.3gpp.org/DynaReporl/23203.htm.
  • 83GPP 'IS 29.212 Policy and Charging Control (PCC)over Gx refer? ence point[S/OL]. [2015-07-22]. http://www.3gpp.org/DynaReport/ 29212.him.
  • 93GPP TS 29.213 Policy and charging control signalling flows andQuality of Service (QoS)parameter mapping[S/OL]. [2015-07- 22]. http://www.3gpp.org/DynaReport/29213.ht m.
  • 103GPP 'IS 29.214 Policy and charging control over Rx reference point [S/OL]. [2015- 07- 22]. http://www.3gpp.org/DynaRcport/29214. him.

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部