System and method for using file hashes to track data leakage and document propagation in a network

作者: Marcus Ranum , Ron Gula

DOI:

关键词: Hash functionData miningDatabaseLeakage (electronics)Computer science

摘要: The system and method described herein may use file hashes to track data leakage document propagation in a network. For example, systems associated with known reference various user devices be compared classify the into groups based on differences between respective systems, identify files unique groups, detect potential or if classified certain include any that are other groups. Additionally, algorithms locations, movements, changes, events relate normal typical activity network, which used generate statistics can subsequent activities occur network potentially anomalous represent propagation.

参考文章(112)
Kevin Overcash, Yoram Zahavi, Doron Kolton, Netta Gavrieli, Rami Mizrahi, Asaf Wexler, Galit Efron (Nitzan), Kate Delikat, System and method of securing networks against applications threats ,(2006)
Marcello Vitaletti, Jonathan Wagner, Fabio Benedetti, Scot MacLellan, Performing inventory scan to determine presence of prerequisite resources ,(2007)
Binh Truong, Matthew D. Hanes, Secure media system ,(2009)
Steven R. Snapp, Stephen B. Campos, Nathan M. Cohen, Steven D. Shanklin, Stephen A. Burke, Craig H. Rowland, Method and system for analyzing and addressing alarms from network intrusion detection systems ,(2003)