Data Leakage/Loss Prevention Systems (DLP)

  title={Data Leakage/Loss Prevention Systems (DLP)},
  author={Radwan Tahboub and Yousef Saleh},
  journal={2014 World Congress on Computer Applications and Information Systems (WCCAIS)},
  • R. TahboubYousef Saleh
  • Published 7 October 2014
  • Computer Science
  • 2014 World Congress on Computer Applications and Information Systems (WCCAIS)
Sensitive and confidential data are a requisite for most companies, so protection for this data takes great attention by company's top management, administrators and IT managers. Data leakage causes negative impact on companies. The traditional security approaches, such as firewalls, can't protect data from leakage. Data leakage/loss prevention (DLP) systems are solutions that protect sensitive data from being in non-trusted hands. This paper is an attempt to survey and study DLP systems that… 

Figures from this paper

A Comparative Evaluation of Data Leakage/Loss Prevention Systems (DLPS)

This review paper aims to study data leakage prevention through some challenges and data protection approaches as well as considering some limitations.

Data Exfiltration Techniques and Data Loss Prevention System

An overview of the basic data exfiltration techniques that deal with file structures and were utilized in multiple scenarios in an attempt to bypass a Data Loss Prevention system is provided.

An efficient data leakage prevention framework for semiconductor industry

  • Sherry ZhuEric GuoMax LuA. Yue
  • Computer Science
    2016 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM)
  • 2016
This paper attempts to analysis data protection requirements in IC foundry and to integrate current DLP (Data leakage prevention) approaches to build an efficient data leakage prevention framework to protect IC field sensitive data safety.

A Comparative Study of the Approach Provided for Preventing the Data Leakage

This review paper aims to study data leakage prevention through some challenges and data protection approaches as well as considering some limitations.

A framework for data loss prevention using document semantic signature

Data protection and insider threat detection and prevention are significant steps for any organization to enhance its internal security and existing DLP approaches face several practical challenges, such as their relatively low accuracy that in turn affects their prevention capability.

Data Vault: A Security Model for Preventing Data Theft in Corporate

This paper aims to provide a comprehensive discussion on data theft and its prevention, and serve as an initial point for businesses in their fight against it.

Information leakage detection and protection of leaked information by using the MAC-IP binding technique

The concepts of data leakage, the techniques to detect the data leakage and the process of protecting the leaked data based on encrypted form and an attempt is also made to identify the user’s intention or behavior during the navigation of data.


The primary goal of the analysis of social network for the DLP was the identification of the patterns of communication in the organization, employing feedback from administrators for identifying any unusual communication for uncovering any data leaks.

The information security in semiconductor industry

A brief introduction of technology protection and physical management method to protect IC field information assets safety is given.

Avoiding Network and Host Detection using Packet Bit-masking

An evasion attack to remotely control a shell and/or exfiltrate sensitive data that manages to avoid most popular host and network intrusion techniques.



Understanding Data Leak Prevention

The idea that, while intrusion detection techniques may be appl icable to many aspects of the data leak prevention problem, the problem is distinct enough that it requires its own solutions is explored.

Data Loss Prevention

Organizations should take measures to understand the sensitive data they hold, how it's controlled, and how to prevent it from being leaked or compromised.

Security Information and Event Management (SIEM)

  • E. Schultz
  • Computer Science
    Encyclopedia of Information Assurance
  • 2011
What SIEM technology is, the functionality it delivers, the benefits as well as the possible downsides of using this technology, and how to manage this technology to achieve maximum benefits are explained.

Data Loss Prevention Technologies

This paper introduces three technologies that will enable information to be used in an expanded workplace with guaranteed safety, without placing a burden on the user and touches upon data loss prevention technologies in the coming era of software as a service (SaaS) and Cloud computing.

The Trend of the Security Research for the Insider Cyber Threat

An insider security which has been one of the biggest issues in the network security is discussed by surveying and analyzing an issue of previous studies and an effective approach for future research is suggested.

Data leakage mitigation for discretionary access control in collaboration clouds

A series of mechanisms to provide defense in depth against information leakage in SaaS collaboration systems are designed, allowing enterprises to encode their organizational security rules as mandatory access control policies, so as to impose coarse-grained restrictions on their employees' discretionary sharing decisions.

Information security labs in IDS/IPS for distance education

It has been shown that the designed remote lab is capable of accommodating both individual and collaborative IDS/IPS experiments under minimum supervision of an instructor and the cost to both student and lab has been kept to the lowest level possible while still maintaining program integrity.

Yet Another Intrusion Detection System against Insider Attacks

The Wang et al.'s insider predection model is improved and the combined model with access control for the ecient insider intrusion detection is proposed, which delegates the role of intrusion detection to users, in order to detect the malicious insiders more eciently.

Towards application classification with vulnerability signatures for IDS/IPS

This work departs from previous approaches by focusing on the semantics of the program and, vulnerability exercised by a sample exploit instead of the semantics or syntax of the exploit itself.

Towards Cyber Defense: Research in Intrusion Detection and Intrusion Prevention Systems

This paper provides a comprehensive review of the current research in both Intrusion Detection Systems and recently emerged Intrusions Prevention Systems.