Design for Prevention of Intranet Information Leakage via Emails

被引:0
|
作者
Manmadhan, Neenu [1 ]
Narayanan, Hari [1 ]
Poroor, Jayaraj [2 ]
Achuthan, Krishnashree [1 ]
机构
[1] Amrita Vishwa Vidyapeetham, Amrita Ctr Cyber Secur Syst & Networks, Amritapuri 690525, Kollam, Saudi Arabia
[2] Founding Minds Software, Kakkanad 682030, India
来源
关键词
Email filtering; Secure Communication; Information Leakage Prevention;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The ubiquitous presences of internet and network technologies have enabled electronic mail systems as the primary medium of communication. Both between and within organizations, sensitive and personal information often transits through the electronic mail systems undetected. Information leakage through this mode of communication has become a daunting problem in today's world. Often the mail volume within an organization is quite large making manual monitoring impossible. In this paper an integration of secure information flow techniques on intranet electronic mail systems is investigated. Categorization of emails based on the sensitivity is accomplished effectively using machine learning techniques. Analyzing the information flow and simultaneously mapping, categorizing and sorting emails in real time prior to receipt of emails has been characterized in this study. Defining security policies and application of lattice models for controlled exchange of emails is discussed. The paper proposed a secure architecture for an email web application. Experimental analysis on the accuracy of the application was determined using Enron email dataset.
引用
收藏
页码:136 / 148
页数:13
相关论文
共 50 条
  • [31] General Design of Rural Area Electricity Management Information System Based on Intranet
    WANG Xing fen (Northeast Agricultural University
    Journal of Northeast Agricultural University(English Edition), 2000, (01) : 29 - 32
  • [32] An approach for prevention of privacy breach and information leakage in sensitive data mining
    Prakash, M.
    Singaravel, G.
    COMPUTERS & ELECTRICAL ENGINEERING, 2015, 45 : 134 - 140
  • [33] Prevention of Data Leakage due to Implicit Information Flows in Android Applications
    Inayoshi, Hiroki
    Kakei, Shohei
    Takimoto, Eiji
    Mouri, Koichi
    Saito, Shoichi
    2019 14TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2019), 2019, : 103 - 110
  • [34] Data Leakage Prevention for Secure Cross-Domain Information Exchange
    Kongsgard, Kyrre Wahl
    Nordbotten, Nils Agne
    Mancini, Federico
    Haakseth, Raymond
    Engelstad, Paal E.
    IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (10) : 37 - 43
  • [35] Research for the Leakage Prevention Design of Automobile Air Conditioning Refrigerant
    Jing, Jiang
    Huang, Jian
    PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON FRONTIERS OF MANUFACTURING SCIENCE AND MEASURING TECHNOLOGY (FMSMT 2017), 2017, 130 : 215 - 218
  • [36] Prevention of Information Leakage by Modulating the Trust Uncertainty in Ego-Network
    Samanta, Moumita
    Pal, Pinakpani
    Mukherjee, Abhik
    2017 9TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS (COMSNETS), 2017, : 377 - 378
  • [37] Building personalised relationships with customers via emails
    Huang, Jen-Hung
    Shyu, Stacy Huey-Pyng
    TOTAL QUALITY MANAGEMENT & BUSINESS EXCELLENCE, 2009, 20 (06) : 585 - 601
  • [38] Plant maintenance via an Intranet
    Foundyller, C
    COMPUTER-AIDED ENGINEERING, 1996, 15 (04): : 66 - 66
  • [39] Evaluation of information leakage via electromagnetic emanation and effectiveness of Tempest
    Tanaka, Hidema
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2008, E91D (05) : 1439 - 1446
  • [40] An Operational Approach to Information Leakage via Generalized Gain Functions
    Kurri, Gowtham R.
    Sankar, Lalitha
    Kosut, Oliver
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2024, 70 (02) : 1349 - 1375