Design for Prevention of Intranet Information Leakage via Emails

被引:0
|
作者
Manmadhan, Neenu [1 ]
Narayanan, Hari [1 ]
Poroor, Jayaraj [2 ]
Achuthan, Krishnashree [1 ]
机构
[1] Amrita Vishwa Vidyapeetham, Amrita Ctr Cyber Secur Syst & Networks, Amritapuri 690525, Kollam, Saudi Arabia
[2] Founding Minds Software, Kakkanad 682030, India
来源
关键词
Email filtering; Secure Communication; Information Leakage Prevention;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The ubiquitous presences of internet and network technologies have enabled electronic mail systems as the primary medium of communication. Both between and within organizations, sensitive and personal information often transits through the electronic mail systems undetected. Information leakage through this mode of communication has become a daunting problem in today's world. Often the mail volume within an organization is quite large making manual monitoring impossible. In this paper an integration of secure information flow techniques on intranet electronic mail systems is investigated. Categorization of emails based on the sensitivity is accomplished effectively using machine learning techniques. Analyzing the information flow and simultaneously mapping, categorizing and sorting emails in real time prior to receipt of emails has been characterized in this study. Defining security policies and application of lattice models for controlled exchange of emails is discussed. The paper proposed a secure architecture for an email web application. Experimental analysis on the accuracy of the application was determined using Enron email dataset.
引用
收藏
页码:136 / 148
页数:13
相关论文
共 50 条
  • [41] LeakThief : Stealing the Behavior Information of Laptop via Leakage Current
    Ding, Dian
    Chen, Yi-Chao
    Ji, Xiaoyu
    Xue, Guangtao
    2023 20TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON SENSING, COMMUNICATION, AND NETWORKING, SECON, 2023,
  • [42] Information leakage via electromagnetic emanations and evaluation of Tempest countermeasures
    Tanaka, Hidema
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2007, 4812 : 167 - 179
  • [43] On the Leakage of Personally Identifiable Information Via Online Social Networks
    Krishnamurthy, Balachander
    Wills, Craig E.
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2010, 40 (01) : 112 - 117
  • [44] Obtaining Information Leakage Bounds via Approximate Model Counting
    Saha, Seemanta
    Ghentiyala, Surendra
    Lu, Shihua
    Bang, Lucas
    Bultan, Tevfik
    PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL, 2023, 7 (PLDI): : 1488 - 1509
  • [45] On the Leakage of Personally Identifiable Information Via Online Social Networks
    Krishnamurthy, Balachander
    Wills, Craig E.
    2ND ACM SIGCOMM WORKSHOP ON ONLINE SOCIAL NETWORKS (WOSN 09), 2009, : 7 - 12
  • [46] Information leakage via electromagnetic emanation and effectiveness of averaging technique
    Tanaka, Hidema
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 98 - 101
  • [47] Quantifying the Information Leakage in Cache Attacks via Symbolic Execution
    Chattopadhyay, Sudipta
    Beck, Moritz
    Rezine, Ahmed
    Zeller, Andreas
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2019, 18 (01)
  • [48] Intranet case study: The role of the TGSLC information center in development of the Intranet
    Martin, JK
    COMPUTERS IN LIBRARIES '98, PROCEEDINGS, 1998, : 116 - 120
  • [49] Data Leakage Prevention: E-Mail Protection via Gateway
    Kaur, Kamaljeet
    Gupta, Ishu
    Singh, Ashutosh Kumar
    10TH INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, 2018, 933
  • [50] Design and developing: an Intranet based comprehensive management information system for power generating stations
    Tang, X.H.
    Wang, Z.D.
    Wuhan Ligong Daxue Xuebao (Jiaotong Kexue Yu Gongcheng Ban)/Journal of Wuhan University of Technology (Transportation Science and Engineering), 2001, 25 (01):