M-score: Estimating the potential damage of data leakage incident by assigning misuseability weight

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

13 Scopus citations

Abstract

Over the past few years data leakage and data misuse have become a major concern for organizations. A data leakage or data misuse incident can damage an organization's reputation and brand name as well as compromise the privacy of its customers. Much research has been conducted in order to find a solution to these threats. Most methods are based on anomaly detection that tracks the user's behavior by examining the syntax of SQL queries in order to detect outlier queries. Other methods examine the data retrieved by the query. In this paper, we propose a new concept for analyzing the retrieved data - the Misuseability Weight. This approach focuses on assigning a score that represents the sensitivity level of the data exposed to the user. This measure predicts the ability of a user to exploit the exposed data in a malicious way. We suggest a new measure, the M-score, which assigns a misuseability weight to a table of data, propose some properties of the new measure and demonstrate its usefulness using over several leakage scenarios.

Original languageEnglish
Title of host publicationProceedings of the 2010 ACM Workshop on Insider Threats, Insider Threats '10, Co-located with CCS'10
Pages13-20
Number of pages8
DOIs
StatePublished - 20 Dec 2010
Event2010 ACM Workshop on Insider Threats, Insider Threats '10, Co-located with CCS'10 - Chicago, IL, United States
Duration: 4 Oct 20108 Oct 2010

Publication series

NameProceedings of the ACM Conference on Computer and Communications Security
ISSN (Print)1543-7221

Conference

Conference2010 ACM Workshop on Insider Threats, Insider Threats '10, Co-located with CCS'10
Country/TerritoryUnited States
CityChicago, IL
Period4/10/108/10/10

Keywords

  • data leakage
  • data misuse
  • misuseability weight
  • security measures

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'M-score: Estimating the potential damage of data leakage incident by assigning misuseability weight'. Together they form a unique fingerprint.

Cite this