Issues in Detecting Confidential Information Leaks in Unstructured Data

Georgy Garbuzov

Abstract


this article addresses the problem detection of leaks of confidential information, presented in the unstructured form, using modern technologies of protection against leaks. In particular, the main properties of unstructured data are considered and the relevance of improving the methods of their processing at the modern commercial enterprise. The review of leakage protection technologies used today is carried out and their efficiency for processing of structured data is evaluated. An approach to improve the effectiveness of information leakage protection technologies in unstructured data is also proposed. Problem statement: to identify the main drawbacks of existing technologies of protection against information leakage in unstructured data and propose measures for their improvement. Main results: The relevance of the problem of unstructured data processing and identification of critical information in them was confirmed, the existing leakage protection technologies were reviewed, their disadvantages were outlined and a way to improve their efficiency when working with certain types of unstructured data was proposed. Practical significance: The proposed approaches can be used by specialists of commercial and non-commercial organizations when designing information security systems designed to protect intangible assets represented in unstructured form. Discussion: A method of extending the capabilities of classical leakage protection systems based on static rules using artificial intelligence technologies is presented.

Full Text:

PDF (Russian)

References


Garbuzov G. Problems of Definitions and Setting Goals for Data Leaks Protection. International Journal of Open Information Technologies, 2024, vol. 12, no. 5, pp. 185-191. (In Russ., abstract in Eng.) EDN: ZXVIYQ

Ferrara E. Determine The Business Value Of An Effective Security Program – Information Security Economics 101. Forrester Research, Inc., October 2, 2012.

Garbuzov G. Technologies for Protecting Intangible Assets from Confidentiality Attacks. International Journal of Open Information Technologies, 2024, vol. 12, no. 9, pp. 142-149. (In Russ., abstract in Eng.) EDN: CXXTYY

Herrera Montano I., García Aranda J.J., Ramos Diaz J., et al. Survey of Techniques on Data Leakage Protection and Methods to address the Insider threat. Cluster Computing, 2022, vol. 25, pp. 4289-4302. doi: https://doi.org/10.1007/s10586-022-03668-2

[On Commercial Secrecy (with The Amendments and Additions): Federal Law No. 98-FZ of July 29, 2004: Adopted by the State Duma on 9 July, 2004]. [Online]. Available: https://www.consultant.ru/document/cons_doc_LAW_48699 (In Russ.)

Civil Code of the Russian Federation (Part Four, (with The Amendments and Additions): Federal Law No. 230-FZ of December 18, 2006: Adopted by the State Duma on November 24, 2006]. [Online]. Available: https://www.consultant.ru/document/cons_doc_LAW_64629/ (In Russ.)

Zarubin A., Smirnov B., Kharitonov S., Denisov D., Main drivers and trends of DLP systems development in the Russian Federation. Prikladnaya informatika = Journal of Applied Informatics, 2020, vol. 15, no. 3, pp. 75-90. (In Russ., abstract in Eng.) doi: https://doi.org/10.37791/2687-0649-2020-15-3-75-90

Haenlein M., Kaplan A. A brief history of artificial intelligence: On the past, present, and future of artificial intelligence. California Management Review, 2019, vol. 61, no. 4, pp. 5-14. doi: https://doi.org/10.1177/0008125619864925 7

Wei J. Research progress and application of computer artificial intelligence technology. MATEC Web of Conferences, 2018, vol. 176. Article number: 01043. doi: https://doi.org/10.1051/matecconf/201817601043

Artyushkina E.S., Skakun O.O., Guz A.R. Using artificial intelligence in DLP systems. Applied economic research, 2023, no. 2, pp. 123-129. (In Russ., abstract in Eng.) doi: https://doi.org/10.47576/2949-1908_2023_2_123

Avdoshin S.M., Pesotskaya E.Yu. Trusted artificial intelligence: Strengthening digital protection. Business Informatics, 2022, vol. 16, no. 2, pp. 62-73. doi: https://doi.org/10.17323/2587-814X.2022.2.62.73

Donglan Liu, Xin Liu, Lei Ma, Yingxian Chang, Rui Wang, Hao Zhang, Hao Yu, Wenting Wang. Research on Leakage Prevention Technology of Sensitive Data based on Artificial Intelligence. In: 2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC). Beijing, China: IEEE Computer Society; 2020. pp. 142-145. doi: https://doi.org/10.1109/ICEIEC49280.2020.9152286

Martinelli F., Marulli F., Mercaldo F., Marrone S., Santone A. Enhanced Privacy and Data Protection using Natural Language Processing and Artificial Intelligence. In: 2020 International Joint Conference on Neural Networks (IJCNN). Glasgow, UK: IEEE Computer Society, 2020. pp. 1-8. doi: https://doi.org/10.1109/IJCNN48605.2020.9206801

Kim J., Lee C., Chang H. The Development of a Security Evaluation Model Focused on Information Leakage Protection for Sustainable Growth. Sustainability, 2020, vol. 12, issue 24. Article number: 10639. https://doi.org/10.3390/su122410639

Zhu T., Ye D., Wang W., Zhou W., Yu P.S. More Than Privacy: Applying Differential Privacy in Key Areas of Artificial Intelligence. IEEE Transactions on Knowledge and Data Engineering, 2022, vol. 34, no. 6, pp. 2824-2843. doi: https://doi.org/10.1109/TKDE.2020.3014246

Guha A., Samanta D., Banerjee A., Agarwal D. Deep Learning Model for Information Loss Prevention From Multi-Page Digital Documents. IEEE Access, 2021, vol. 9, pp. 80451-80465. doi: https://doi.org/10.1109/ACCESS.2021.3084841


Refbacks

  • There are currently no refbacks.


Abava  Кибербезопасность ИБП для ЦОД СНЭ

ISSN: 2307-8162