1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

Research Article

The Design of Framework for Detecting an Insider’s Leak of Confidential Information

  • @INPROCEEDINGS{10.4108/e-forensics.2008.2658,
        author={Eunju Beak and Yeog Kim and Jinwon Sung and Sangjin Lee},
        title={The Design of Framework for Detecting an Insider’s Leak of Confidential Information},
        proceedings={1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia},
        publisher={ACM},
        proceedings_a={E-FORENSICS},
        year={2010},
        month={5},
        keywords={Insiders Leak of information Digital forensics},
        doi={10.4108/e-forensics.2008.2658}
    }
    
  • Eunju Beak
    Yeog Kim
    Jinwon Sung
    Sangjin Lee
    Year: 2010
    The Design of Framework for Detecting an Insider’s Leak of Confidential Information
    E-FORENSICS
    ACM
    DOI: 10.4108/e-forensics.2008.2658
Eunju Beak1,*, Yeog Kim2,*, Jinwon Sung1,*, Sangjin Lee3,*
  • 1: Graduate School of Information Management & Security Korea Univ., Anam-dong, Seongbuk-gu, Seoul +82-2-3290-4738
  • 2: Graduate School of Information Management & Security Korea Univ., Anam-dong, Seongbuk-gu, Seoul +82-2-3290-4276
  • 3: Graduate School of Information Management & Security Korea Univ., Anam-dong, Seongbuk-gu, Seoul +82-2-3290-4893
*Contact email: ej0083@korea.ac.kr, yeog@cist.korea.ac.kr, jinwonsung@korea.ac.kr, sangjin@korea.ac.kr

Abstract

The confidential information such as the technical know-how or the business information of an enterprise is very important because it may make the enterprise do the business or not. The enterprise, therefore, are in control of its confidential or critical information with the support of a lot of time and fund. In spite of their effort, 87% of the leak of confidential information is due to insiders[1]. The cause of the leak of confidential information is the negligent or weak control of employee’s E-mail, instant message, P2P and so on. It also comes that insiders leak some information maliciously for the purpose of economical profit or are industrial spy. The frequency of those is increasing more and more[2]. The insiders are very skilled in the equipments or systems of the organization which they belong to and can delete immediately their traces after their improper activities. Therefore, it needs the acquisition of data in conformity with the leak type of confidential information for finding out the evidence. We propose a framework to detect and prevent the leak of confidential information according to the leak type with the forensic sight. And the framework has also the function of the first response and the gathering evidence.