Skip to main content
Erschienen in:
Buchtitelbild

2018 | OriginalPaper | Buchkapitel

On the Use of Matrix Bloom Filters in Data Leak Protection

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Data leak prevention systems become a must-have component of enterprise information security. To minimize the communication delay, these systems require quick mechanisms for massive document comparison. Bloom filters have been proven to be a fast tool for membership checkup. Taking into account specific needs of fast text comparison this chapter proposes modifications to the Matrix Bloom filters. Approach proposed in this chapter allows improving density in Matrix Bloom filters with the help of special index to track documents uploaded into the system. Density is improved by combining a few documents in one line of the matrix to reduce the filter size and to address the problem of document removal. Special attention is paid to the negative impact of filter-to-filter comparison in matrix filters. Theoretical evaluation of the threshold for false positive results is provided. The experiment provided in the chapter outlines advantages and applicability of the proposed approach.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
7.
Zurück zum Zitat Blackwell, C.: A security architecture to protect against the insider threat from damage, fraud and theft. In: Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research (CSIIRW ’09), Article 45, p. 4 (2009). https://doi.org/10.1145/1558607.1558659 Blackwell, C.: A security architecture to protect against the insider threat from damage, fraud and theft. In: Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research (CSIIRW ’09), Article 45, p. 4 (2009). https://​doi.​org/​10.​1145/​1558607.​1558659
11.
Zurück zum Zitat Geravand, S.; Ahmadi, M.A.: Novel adjustable matrix bloom filter-based copy detection system for digital libraries. In: 2011 IEEE 11th International Conference on Computer and Information Technology (CIT), pp. 518–525, 31 Aug 2011–3 Sept 2011. https://doi.org/10.1109/CIT.2011.61 Geravand, S.; Ahmadi, M.A.: Novel adjustable matrix bloom filter-based copy detection system for digital libraries. In: 2011 IEEE 11th International Conference on Computer and Information Technology (CIT), pp. 518–525, 31 Aug 2011–3 Sept 2011. https://​doi.​org/​10.​1109/​CIT.​2011.​61
13.
Zurück zum Zitat Broder, A.Z., Mitzenmacher, M.: Network Applications of Bloom Filters: A Survey. Internet Mathematics, Vol 1, No 4, pp. 485–509 (2005) Broder, A.Z., Mitzenmacher, M.: Network Applications of Bloom Filters: A Survey. Internet Mathematics, Vol 1, No 4, pp. 485–509 (2005)
14.
Zurück zum Zitat Fan, L., Cao, P., Almeida, J., Broder, A.: Summary cache: a scalable widearea web cache sharing protocol. IEEE/ACM Trans. Netw. 8(3), 281–293, (2000) Fan, L., Cao, P., Almeida, J., Broder, A.: Summary cache: a scalable widearea web cache sharing protocol. IEEE/ACM Trans. Netw. 8(3), 281–293, (2000)
15.
Zurück zum Zitat Karp, R.M., Rabin, M.O.: Pattern-matching algorithms. IBM J. Res. Dev. 31(2), 249–260 (1987) Karp, R.M., Rabin, M.O.: Pattern-matching algorithms. IBM J. Res. Dev. 31(2), 249–260 (1987)
16.
Zurück zum Zitat Schleimer, S., Wilkerson, D., Aiken, A.: Winnowing: local algorithms for document fingerprinting. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 76–85, June 2003 Schleimer, S., Wilkerson, D., Aiken, A.: Winnowing: local algorithms for document fingerprinting. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 76–85, June 2003
18.
Zurück zum Zitat Potthast, M., Gollub, T., Hagen, M., Kiesel, J., Michel, M., Oberländer, A., Stein, B.: Overview of the 4th international competition on plagiarism detection. In: CLEF Online Working Notes/Labs/Workshop (2012) Potthast, M., Gollub, T., Hagen, M., Kiesel, J., Michel, M., Oberländer, A., Stein, B.: Overview of the 4th international competition on plagiarism detection. In: CLEF Online Working Notes/Labs/Workshop (2012)
Metadaten
Titel
On the Use of Matrix Bloom Filters in Data Leak Protection
verfasst von
Sergey Butakov
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-68392-8_1