The role of information specialists has broadened in recent years, and, for many, it now includes shared responsibility for the security of the intellectual property of the organization. Information security is a responsibility that, broadly defined, includes two major areas: protection from intruders and protection from unwanted release of information. The first of these, protection from intruders, is usually the responsibility of the IT team alone, and focuses on three major concerns: interruption of service, protection of IP addresses, and intrusion detection. All these pertain to protecting an organization's intellectual property from assault from outside the organization.
There is a second, equally important area: protection of an organization from unwanted release of information to inappropriate recipients. While information specialists are frequently seen as providing the conduits for getting vital information to the right people at the right time, they also are increasingly being asked to participate in the task of ensuring that vital information is not released to those who do not have the right to it. They are protecting an organization's intellectual property from advertent or inadvertent breaches of security from within the organization.
BOUNDARY CONTROLLERS
The technical solution for preventing the unauthorized release of sensitive information is referred to as "boundary control." A boundary controller is a software solution designed to enforce the business rules of an organization in order to control the information flows between the organization and the outside world, as well as between internal units. A high accuracy boundary controller is essential in supporting the information sharing that is required within an organization where there are groups that must share some, but not all, information.
Here's a real-world situation that requires boundary controllers: a company has decided to do research and development on a new approach to solving a common, expensive problem within the industry, and needs to protect this competitive advantage. Another is a financial services firm that must ensure outgoing email messages are in full compliance with securities laws and regulations. Boundary controllers come into play when an organization is providing technology to a team within a multinational task force and needs to share necessary information with other teams, but national security deems that not all information be shared.
POSSIBLE APPROACHES
There are a number of possible approaches to the boundary control problem that have been utilized commercially, as well as in internally developed solutions. The main distinction is between keyword and conceptual approaches.
Keyword Approach
The keyword approach is what is also referred to as the "dirty word" approach, whereby an organization prepares a list of words that, if contained in an outgoing message or document, should raise a security concern for that organization. Technically simple, most keyword approaches tokenize outgoing messages and documents into words. The words are then compared against a pre-established dirty word list. If such a word were found, the email system or document server would either stop the message or document from being sent, or, alternatively, route it to a human reviewer. The reviewer would then make the decision whether the message or document really posed a security concern, and either block it or send it on to its intended recipient. Dirty words might include sensitive internal project names, technical terms being used in current research, or the names of competitors.
The keyword boundary controller approach is technologically the inverse of the approach utilized in most Web-based filters intended to prevent children from accessing mature Web sites, and thus its name-dirty word list. These filters prevent Web sites with content matching the keywords from being accessed by a user's computer, while boundary controllers compare outgoing messages to a keyword list. But the limitations endemic to the keyword approach when used in censorware, which have been widely reported in the press, are similar. Namely, since language is so ambiguous, a word can express multiple meanings, and some of its occurrences will reflect the sense intended in the keyword list, as well as senses that are quite innocuous. However, a keyword system cannot tell the difference, and therefore, many false hits are detected. Secondly, the same meaning can be expressed by different words, thereby requiring the developer of the keyword list to include every possible synonym in order for the list to be exhaustively protective. If the keyword list does not contain all such re-phrasings, offending messages, documents, or Web sites are not accurately screened.
Conceptual Approach
The conceptual approach is based on a more sophisticated processing of both the organization's business rules and the content of outgoing messages or documents. First, the organization's business rules are run a priori through the Natural Language Processing (NLP) module to produce a rich semantic representation, versus an orthographic word-based representation. Then, when a user attempts to send a message or document, the same NLP is performed on the message to produce a higher-level, more abstract representation of its content. A semantic comparison of representations is then computed between the business rules and the outgoing message or document to determine whether it is releasable or unreleasable. There are two methods for conducting this semantic comparison, each using rich features of the texts. Both of these will be described after a brief introduction to NLP.
NATURAL LANGUAGE PROCESSING
Natural Language Processing is a method for analyzing text that utilizes all levels of human language understanding in order to accurately represent the contents of the text. NLP applies algorithms, which interpret the meaning that is conveyed both explicitly and implicitly in parts of words, words, phrases, syntax, various meanings of a single word, the flow and intent of spans of text, as well as how the language refers to entities in the real world. NLP is complex, but major advances have been accomplished in recent years to the point where the extra processing time and power required by NLP has been deemed worthy for a range of applications, given the improved quality of performance.
For example, a business rule that has been processed through a full NLP module will have the words morphologically analyzed and the meanings of the roots, as well as the suffixes, stored in the representation. After this, each word will be tagged with its correct part-of-speech tag, phrasal concepts will be bracketed and not stored as unrelated single words, the correct sense of each polysemous word will have the correct sense of the word selected, and synonymous words and phrases of each concept in the business rule will be appended to the stored representation. Entities, relations, and events will be understood. For example, a human name will be tagged as a person, the syntactic role of subject in a sentence; if already tagged as a person, and the subject of an active verb, the module will indicate that person as the agent of the action described by the verb, the frame for the event instantiated by the verb will be activated, and the attached slots of the frame filled with semantic information from the sentence.
NLP's ability to produce a representation of business rules, as well as outgoing messages and documents with this degree of human-like knowledge enrichment, is what makes the conceptual approach to boundary control so powerful. In the following, Part A provides the semantic representation, and Part B provides the logical representation of the business rule that states that, "Junior employees of the Acme Corporation must not describe specifications of company products in outgoing emails." For the sake of clarity, the logical representation does not contain all the semantic details of A.
If ISA (?X,junior_employee) and ISA (?Y, Acme_product) and ISA (?Z, email) and RCPT (?Z, ?P) and LOC (?P, outside_network) and CONT (?Z, 'ASSOC (?Y, ?A) & MEAS (?A, ?B)'), then CHRC (?Z, nonreleasable).
The two means by which conceptual boundary controllers can be im- plemented are the information re- trieval approach and the categorization approach.
Information Retrieval Approach
The information retrieval (IR) approach utilizes conceptual representations of an organization's busi- ness rules as semantic releasability models-one for each rule or set of rules. The system then processes each outgoing message or document through the same NLP module. The resulting conceptual representation of the message is compared to all the business rule representations, and, if the match between the intended missive meets a predetermined criteria of similarity to any business rule, the message or document is barred from release. This method basically simulates the routing query style of IR, where the representations of the business rules can be seen as functioning as standing queries. The system matches the outgoing documents against them.
Categorization Approach
This approach begins with obtaining or producing a training set of outgoing messages and documents that are categorized according to whether they are releasable or, if not releasable, categorizing them according to which of the business rules they breach. These training messages and documents are then run through the conceptual NLP-based processing de- scribed above for a rich marking of linguistic features. The training docu- ments are processed by a classification engine which utilizes a machine learning algorithm that enables the boundary controller to produce, test, and retest the best vector for each rule. The vector contains the distinguishing terms, phrases, concepts, entities, relations, and events which characterize a message or document breaching that rule.
After the system has been trained, these vectors are used to categorize each new outgoing missive according to whether it is releasable or unreleasable because it violates a business rule.
TESTING
My group empirically tested the keyword and conceptual approaches as part of a federally funded DARPA research project [1]. The goal was to determine the relative merits of these two approaches, in terms of effectiveness and efficiency, with the goal of understanding how best to combine the two for the greatest pay-off. The experiment compared the performance of a commercially available keyword boundary controller, used by many organizations, to the performance of a conceptual boundary controller, namely DataShield, solutions-united. com's NLP-based categorization-style boundary controller (http://www.solutions-united.com/datashield). DataShield utilizes a probabilistic text classifier and uncertainty sampling algorithm [2].
The test results, run on 112 messages plus attachments, showed that the conceptual approach significantly outperformed the keyword approach in terms of messages correctly blocked and messages correctly released. The keyword commercial system had scores of 70% precision and 38% recall; while the DataShield system had scores of 96% precision and 99% recall. In terms of efficiency, it took the keyword commercial system 2.04 seconds and DataShield took 9.75 seconds.
The difference in effectiveness is significant, and while the difference in efficiency may appear to be a rather dramatic difference, it must be weighed against the performance results, which showed that the conceptual system stopped 99% of the un- releasable messages from being sent out, and only stopped 4% of the messages that should have been released. Although it took four and a half times longer for the conceptual system (then still a prototype), this needs to be compared to trained human subjects who, in this experiment, took an average time of 560 seconds or 9.33 minutes to review and decide on the releasability of this same set of documents.
CHOOSING A SYSTEM
Information specialists who share in the responsibility for the information security of their organization's intellectual property need to look for a conceptual boundary controller that both recognizes differences in 'need to know' among internal departments, and prevents advertent and inadvertent security slip-ups. The solutions available today are much better than what was available just a year or so ago, when the only choice was between hiring and training a human security monitor who was effective, but extremely inefficient; or by relying on a keyword boundary controller, which was efficient, but not sufficiently effective. The advancement of conceptual boundary controllers using NLP is making sophisticated, conceptual boundary control a reality.
REFERENCES
[1] Filsinger, J., Morrison, W., Monteith, E., Gallaro, D., Paik, W., Hoffman, M., Smith, R. & Bebee, B. (2000). Advanced Boundary Control Capability Experiment Report. Interim Technical Report for Defense Advanced Research Project Agency (DARPA) Information Systems Office (NAI Labs #00-017), NAI Labs, Washington, DC.
[2] Lewis, D. & Gale, W. (1994). "A sequential algorithm for training text classifiers." Proceedings of the 21st Annual International ACM-SIGIR Conference on Research and Development in Information Retrieval.
Elizabeth Liddy, Ph.D. (liddy@syr.edu) is director of the Center for Natural Language Processing, School of Information Studies, Syracuse University.
THE DEPARTURE. Our travellers were not obliged to bargain for their conveyance, as they went ashore in the boat belonging to the hotel where they intended to stay. The runner of the hotel took charge of their baggage and placed it in the boat; and when all was ready, they shook hands with the captain and purser of the steamer, and wished them prosperous voyages in future. Several other passengers went ashore at the same time. Among them was Captain Spofford, who was anxious to compare the Yokohama of to-day with the one he had visited twenty years before. "Tell me," said the Doctor, without moving a muscle in his face, "was she satisfied with her tour of my premises?" The Doctor stabbed a finger wildly in the direction of the coal cellar. "If you had seen what I have seen to-night, you would understand. You would be feeling exactly as I am now." Meanwhile Balmayne had crept in downstairs. He crossed over and helped himself liberally to brandy. He took a second glass, and a third. But there came none of the glow of courage to his heart. There was nothing in the kitchen, but there were some boxes in the storeroom beyond--a tin or two of sardines and some biscuits. Also in a wine cellar Leona found a flask or two of Chianti. "A glass of beer, madame." Outside Cherath a motor-car stood between some partially removed trees. Two officers and three soldiers stood around a map which they had laid on the ground, and with them was a young girl, scarcely twenty years old. She was weeping, and pointed out something on the map, obviously compelled to give information. One of the officers stopped me, was clearly quite satisfied with my papers, but told me that I was not allowed to go on without a permit from the military command. Then I pulled out of my pocket, as if of great importance, the scrap of paper which the commanding officer at the bridge near Lixhe had given me. The other had scarcely seen the German letters and German stamp when he nodded his head approvingly, and quickly I put the thing back, so that he might not notice that I was allowed only to go to Visé. The critical tendency just alluded to suggests one more reason why philosophy, from having been a method of discovery, should at last become a mere method of description and arrangement. The materials accumulated by nearly three centuries of observation and reasoning were so enormous that they began to stifle the imaginative faculty. If there was any opening for originality it lay in the task of carrying order into this chaos by reducing it to a few general heads, by mapping out the whole field of knowledge, and subjecting each particular branch to the new-found processes of definition325 and classification. And along with the incapacity for framing new theories there arose a desire to diminish the number of those already existing, to frame, if possible, a system which should select and combine whatever was good in any or all of them. On a square, shaded by an awning, with porticoes all round, coolies in white dresses sat on the ground making up little bunches of flowers, the blossoms without stems tied close to a pliant cane for garlands—jasmine, roses, chrysanthemums, and sweet basil—for in India, as in Byzantium of old, basil is the flower of kings and gods. The basil's fresh scent overpowered the smell of sandal-wood and incense which had gradually soaked into me in the presence of the idols, and cleared the atmosphere delightfully. A woman rolled up in pale-tinted muslins under the warm halo of light falling through the[Pg 80] awning, was helping one of the florists. She supported on her arm a long garland of jasmine alternating with balls of roses. Almost motionless, she alone, in the midst of the idols, at all reminded me of a goddess. A tall wide gate beyond the bridge opens into the ferocious fortress of Hyderabad. Shorty entered the court with an air of extreme depression in face and manner, instead of the usual confident self-assertion which seemed to flow from every look and motion. He stood with eyes fixed upon the ground. "Wot's fretting you, boy?" he asked. The price was now agreed upon, and the purse that accompanied the pursuivant's dress was more than sufficient to satisfy the exorbitant demand of the foreman. The day was favourable for the pageant, and the houses seemed to vie with each other in the variety of their silken colours and tinselled ornaments, glowing and glittering in the morning sun. At Cornhill, indeed, the meretricious adornments of art were superseded for a brief space by the simple beauty of nature, and the eye felt a momentary relief in resting on the green grass, and the few shaded trees that covered the open ground. But this green spot was succeeded by a dense mass of dwellings covered with hangings of a richness suitable to the reputed wealth of the city merchants; here the scene was animated in the extreme,—the motions of the crowd became unsteady and irregular, as they were actuated at once by eagerness to hurry on, and a desire to linger among the rainbow diversity of hues around them, and the glowing beauty which, arrayed with costly elegance, and smiling with anticipated enjoyment, graced every open window. HoME大香蕉群交之肛交视频在线
ENTER NUMBET 0016fldfnm.com.cn htjia.com.cn jc8news.com.cn gihwdp.com.cn pzeegc.com.cn naisibo.com.cn www.uf8news.com.cn poizli.com.cn www.ubdex.com.cn www.qesocb.com.cn