Facial reconstruction

Search LJMU Research Online

Browse Repository | Browse E-Theses

A NOVEL COMPONENT BASED FRAMEWORK FOR COVERT DATA LEAKAGE DETECTION

Nafea, H (2020) A NOVEL COMPONENT BASED FRAMEWORK FOR COVERT DATA LEAKAGE DETECTION. Doctoral thesis, Liverpool John Moores University.

[img]
Preview
Text
2020-HanaaNafea-PhD.pdf - Published Version

Download (4MB) | Preview

Abstract

Cyber-attacks are causing billions of dollars of losses every year and data breaches are one of the major causes of these losses. The problem of data breach/leakage is attributed as a serious threat to organisations where any incident can inflict cost that is not only limited to monetary value but also can cause damage to organization goodwill, branding and reputation. Steganography is the practice of writing hidden messages via a medium in such a way that only the sender and the intended recipient know about the hidden message. Steganography is categorised into different forms including text, image, audio, video and network/protocol steganography. Network steganography is increasingly being used by malwares to facilitate the data leakage. This study focuses on aspects of network steganography at different levels of network packets. The existing tools for data leakage prevention and detection are often bypassed by the use of sophisticated techniques such as network steganography for stealing the data. This is due to several weaknesses of the existing detection systems. First, these techniques have high time and memory training complexities as well as large training data sets. These are challenging issues as the amount of data generated every second becomes very large in many realms. Secondly, the number of their false positives is high, making them inaccurate. Finally, there is a lack of a framework catering for needs such as raising alerts as well as data monitoring and updating/adapting of a threshold value used for checking packets for covert data. To overcome these weaknesses, this study proposes a novel framework that includes elements such as continuous data monitoring, threshold maintenance and alert notification. The study also proposes a model based on statistical measures to detect covert data leakages especially with regard to non-linear chaotic data. The main advantage of the proposed framework is its capability of providing more efficient results with tolerance/threshold values. Experiment outcomes indicate that the proposed framework performs better in comparison with state-of-the-art techniques in terms of accuracy and efficiency. Additionally, the proposed ii mathematical model can also be used for on-the-fly detection of covert data as opposed to offline processing methods.

Item Type: Thesis (Doctoral)
Uncontrolled Keywords: Keywords: Data Leakage, Data Leakage Prevention, Steganography, Covert Channel, Phase Space Reconstruction, TCP/IP protocol.
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: Computer Science & Mathematics
Date Deposited: 29 Jul 2020 16:47
Last Modified: 08 Nov 2022 13:09
DOI or ID number: 10.24377/LJMU.t.00013407
Supervisors: Shi, Q
URI: https://researchonline.ljmu.ac.uk/id/eprint/13407
View Item View Item