Abstract
Information leakage is a growing public concern. This paper describes a visualization system for tracing leaks involving confidential information. In particular, the system enables administrators to determine which hosts have confidential documents and the means by which confidential information is transmitted, received and duplicated. The visualization system is scalable to large organizations and can track various means of information propagation in a seamless manner. Also, it helps prevent information leaks, analyze transmission routes and present forensic evidence.
Chapter PDF
Similar content being viewed by others
References
R. Battistoni, E. Gabrielli and L. Mancini, A host intrusion prevention system for Windows operating systems, Proceedings of the Ninth European Symposium on Research on Computer Security, pp. 352–368, 2004.
Identity Theft Resource Center, 2008 data breach totals soar, Press Release, San Diego, California (www.idtheftcenter.org/artman2/publish/m_press/2008_Data_Breach_Totals_Soar.shtml), 2009.
Information-Technology Promotion Agency, Countermeasures Aga- inst Information Leakage: Seven Rules for People Working in Business Enterprises, Tokyo, Japan (www.ipa.go.jp/security/english/virus/antivirus/pdf/Leakage_measures_eng.pdf), 2006.
M. Kawakita, K. Yanoo, M. Hosokawa, H. Terasaki, S. Aoki and T. Usuba, InfoCage – Information leakage protection software, NEC Journal of Advanced Technology, vol. 2(1), pp. 40–46, 2005.
K. Kida, H. Sakamoto, H. Shimazu and H. Terumi, InfoCage: A development and evaluation of confidential file lifetime monitoring technology by analyzing events from file systems and GUIs, Proceedings of the Second International Workshop on Security, pp. 246–261, 2007.
R. Koike, N. Nakaya and Y. Koui, Development of a USB flash memory for detecting computer viruses, Information Processing Society of Japan Journal, vol. 48(4), pp. 1595–1605, 2007.
McAfee, Unsecured Economies: Protecting Vital Information, Santa Clara, California, 2009.
NEC Corporation, No. 1 market share for domestic quarantine tools for three consecutive years, Press Release, Tokyo, Japan (www.nec.co.jp/press/ja/0808/2701.html), 2008.
Security Incident Investigation Working Group, Survey Report of Information Security Incidents 2007, Version 1.0, NPO Japan Network Security Association, Tokyo, Japan (www.jnsa.org/result/2007/pol/incident/2007incidentsurvey_e_v1.0.pdf), 2008.
Sky Corporation, SKYSEA Client View, Osaka, Japan (www.skyseaclientview.net).
Symantec Corporation, Data loss prevention: Products and services, Mountain View, California (www.symantec.com/business/theme.jsp?themeid=vontu).
S. Tsujii and E. Hagiwara (Eds.), Encyclopedia of Digital Forensics, Nikkagiren Press, Tokyo, Japan, 2008.
S. Willassen and S. Mjolsnes, Digital forensics research, Telektronikk, vol. 2005(1), pp. 92–97, 2005.
C. Willems, T. Holz and F. Freiling, Toward automated dynamic malware analysis using CWSandbox, IEEE Security and Privacy, vol. 5(2), pp. 32–39, 2007.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 International Federation for Information Processing
About this paper
Cite this paper
Nakayama, Y., Shibaguchi, S., Okada, K. (2010). A Visualization System for Analyzing Information Leakage. In: Chow, KP., Shenoi, S. (eds) Advances in Digital Forensics VI. DigitalForensics 2010. IFIP Advances in Information and Communication Technology, vol 337. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15506-2_19
Download citation
DOI: https://doi.org/10.1007/978-3-642-15506-2_19
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-15505-5
Online ISBN: 978-3-642-15506-2
eBook Packages: Computer ScienceComputer Science (R0)