作者: Marcus Ranum , Ron Gula
DOI:
关键词: Hash function 、 Data mining 、 Database 、 Leakage (electronics) 、 Computer science
摘要: The system and method described herein may use file hashes to track data leakage document propagation in a network. For example, systems associated with known reference various user devices be compared classify the into groups based on differences between respective systems, identify files unique groups, detect potential or if classified certain include any that are other groups. Additionally, algorithms locations, movements, changes, events relate normal typical activity network, which used generate statistics can subsequent activities occur network potentially anomalous represent propagation.