Takuya Kaneko, T. Nagaya, K. Takemori, Yutaka Miyake, M. Nishigaki
{"title":"A Proposal for the Deterrence of Information Leakage Using Anti-virus Software","authors":"Takuya Kaneko, T. Nagaya, K. Takemori, Yutaka Miyake, M. Nishigaki","doi":"10.1109/NBiS.2013.17","DOIUrl":null,"url":null,"abstract":"In recent years, the leakage of confidential files through the P2P (peer-to-peer) file sharing software has become a problem. Once sensitive files have been leaked to a P2P network, they are distributed rapidly and at random to a great many computers, bringing the danger of far-reaching damage. To deal with this, we propose a method to control the diffusion of sensitive file leakage on P2P networks by deleting the leaked sensitive files in the destination PC of the P2P user. In this method, we focus on the characteristic of anti-virus software that reacts to the unique patterns of a virus, automatically isolating and deleting a file concerned. By using the unique pattern of a virus to make the leaked sensitive file appear as a viral infection file, the anti-virus software installed on the destination PC will automatically delete the file. This is the concept of our method.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 16th International Conference on Network-Based Information Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NBiS.2013.17","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In recent years, the leakage of confidential files through the P2P (peer-to-peer) file sharing software has become a problem. Once sensitive files have been leaked to a P2P network, they are distributed rapidly and at random to a great many computers, bringing the danger of far-reaching damage. To deal with this, we propose a method to control the diffusion of sensitive file leakage on P2P networks by deleting the leaked sensitive files in the destination PC of the P2P user. In this method, we focus on the characteristic of anti-virus software that reacts to the unique patterns of a virus, automatically isolating and deleting a file concerned. By using the unique pattern of a virus to make the leaked sensitive file appear as a viral infection file, the anti-virus software installed on the destination PC will automatically delete the file. This is the concept of our method.