کد مقاله | کد نشریه | سال انتشار | مقاله انگلیسی | نسخه تمام متن |
---|---|---|---|---|
6884898 | 1444359 | 2018 | 57 صفحه PDF | دانلود رایگان |
عنوان انگلیسی مقاله ISI
Data exfiltration: A review of external attack vectors and countermeasures
ترجمه فارسی عنوان
انفوزیون داده ها: بررسی بردارهای حمله خارجی و اقدامات مقابله با آن
دانلود مقاله + سفارش ترجمه
دانلود مقاله ISI انگلیسی
رایگان برای ایرانیان
کلمات کلیدی
فرایند داده، نشت اطلاعات، سرقت اطلاعات، نقض اطلاعات، بردار حمله خارجی، اقدامات مخالف،
موضوعات مرتبط
مهندسی و علوم پایه
مهندسی کامپیوتر
شبکه های کامپیوتری و ارتباطات
چکیده انگلیسی
This review has revealed that (a) most of the state of the art is focussed on preventive and detective countermeasures and significant research is required on developing investigative countermeasures that are equally important; (b) Several data exfiltration countermeasures are not able to respond in real-time, which specifies that research efforts need to be invested to enable them to respond in real-time (c) A number of data exfiltration countermeasures do not take privacy and ethical concerns into consideration, which may become an obstacle in their full adoption (d) Existing research is primarily focussed on protecting data in 'in use' state, therefore, future research needs to be directed towards securing data in 'in rest' and 'in transit' states (e) There is no standard or framework for evaluation of data exfiltration countermeasures. We assert the need for developing such an evaluation framework.
ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Journal of Network and Computer Applications - Volume 101, 1 January 2018, Pages 18-54
Journal: Journal of Network and Computer Applications - Volume 101, 1 January 2018, Pages 18-54
نویسندگان
Faheem Ullah, Matthew Edwards, Rajiv Ramdhany, Ruzanna Chitchyan, M. Ali Babar, Awais Rashid,