Fig. 1 Hadoop 2.0 system configuration[10]
Fig. 2 The basic architecture of the Flume-NG
Fig. 3 Configuration of the secret file leakage prevention system
Fig. 4 Signature inserting process
Fig. 5 Storage retrieval and confidential file protection process
Fig. 6 NAS server configuration
Fig. 7 Ubuntu server configuration
Fig. 8 Configuration of the Hadoop distributed file system
Fig. 9 Signature inserted file
Fig. 10 Detection of confidential and ordinary file transfer to portable data medium
Fig. 11 Visualization of leakage of confidential file by both user name and file extension
Fig. 12 Amount of network traffic by time
Fig. 13 Comparison of data processing time between MySQL and Hive
참고문헌
- J. S. Lee and K. H. Lee, "A study on security container to prevent data leaks," Journal of the Korea Institute of Information Security & Cryptology, vol. 24, no. 6, pp. 1225-1241, June 2014. https://doi.org/10.13089/JKIISC.2014.24.6.1225
- M. B. Hyun and S. J. Lee, "The proactive threat protection method from predicting resignation throughout DRM log analysis and monitor," Journal of The Korea Institute of Information Security & Cryptology, vol. 26, no. 2, pp. 369-375, Feb. 2016. https://doi.org/10.13089/JKIISC.2016.26.2.369
- J. H. Choi and S. Y. Rhew, "Monitoring system of file outflow through storage devices and printers," Journal of the Korea Institute of Information Security & Cryptology, vol. 15, no. 4, pp. 51-60, April 2005.
- T. K. Ju and W. Shin, "A new filtering system against the disclosure of sensitive internal information," Journal of the Korea Institute of Information and Communication Engineering, vol. 19, no. 5, pp. 1137-1143, May 2015. https://doi.org/10.6109/jkiice.2015.19.5.1137
- J. U. Choi and Y. J. Lee, "E-DRM-based privacy protection technology for overcoming technical limitations of DLP-based solutions," Journal of the Korea Institute of Information Security & Cryptology, vol. 22, no.5, pp. 1103-1113, Oct. 2012.
- S. J. Hee and H. B. Park, " Multiple barcode watermarking technique for improve robustness and imperceptibility," Journal of the Korea Institute of Information and Communication Engineering, vol. 20. no. 9. pp. 1723-1729, Sept. 2016. https://doi.org/10.6109/JKIICE.2016.20.9.1723
- G. J. Shin, G. H. Jung, D. M. Yang, and B. H. Lee, "A USB DLP Scheme for Preventing Loss of Internal Confidential Files," Journal of the Korea Institute of Information and Communication Engineering, vol. 21. no. 12. pp. 2333-2340, Dec. 2017. https://doi.org/10.6109/JKIICE.2017.21.12.2333
- Snort Users Manual [Internet]. Available: https://snort.org/documents.
- S. N. Park, A. Y. Kim, and H. K. Jung, "A study on signature-based wireless intrusion detection systems," Journal of the Korea Institute of Information and Communication Engineering, vol. 19. no. 5, pp. 1122-1127, May 2014.
- Apache Hadoop [Internet]. Available: https://hadoop.apache.org/.
- R. D. Caytiles, "Big Data is not just Hadoop," Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology, vol. 1, no. 1, pp. 11-16, June 2012.
- Apache Flume [Internet]. Available: https://flume.apache.org/.
- The industry-standard windows packet capture library. Available: https://www.winpcap.org/.
- Apache Sqoop [Internet]. Available: http://sqoop.apache.org/.
- Apache Hive [Internet]. Available: https://hive.apache.org/.