The following operators can be used to better focus your queries.
( ) , AND, OR, NOT, W/#
? single char wildcard, not at start
* multi char wildcard, not at start
(Cat? OR feline) AND NOT dog?
Cat? W/5 behavior
(Cat? OR feline) AND traits
Cat AND charact*
This guide provides a more detailed description of the syntax that is supported along with examples.
This search box also supports the look-up of an IP.com Digital Signature (also referred to as Fingerprint); enter the 72-, 48-, or 32-character code to retrieve details of the associated file or submission.
Concept Search - What can I type?
For a concept search, you can enter phrases, sentences, or full paragraphs in English. For example, copy and paste the abstract of a patent application or paragraphs from an article.
Concept search eliminates the need for complex Boolean syntax to inform retrieval. Our Semantic Gist engine uses advanced cognitive semantic analysis to extract the meaning of data. This reduces the chances of missing valuable information, that may result from traditional keyword searching.
Sensitive Data Leak Alert (SDLA) is an efficient alarm method to determine
if confidential or sensitive data is being transmitted outside a corporate
English (United States)
This text was extracted from a PDF file.
This is the abbreviated version, containing approximately
72% of the total text.
Page 1 of 1
Sensitive Data Leak Alert
Sensitive Data Leak Alert (SDLA) is an efficient alarm method to determine if confidential or sensitive data is being transmitted outside a corporate firewall.
The current state of the art for hacking is to exploit a buffer overflow in an open port, e.g. http server. With the buffer overflow the command the hacker will execute is a shell. Now the hacker has access to the corporate network, undetected by the firewall because he has gotten in via an open port (http 80) instead of a port like telnet which has been closed by the firewall.
Once in the web server the hacker will telnet out to the corporate network and attempt to find valuable or sensitive data. Again this will all be undetected by the firewall, because when it crosses the firewall the connection port will be the open port 80.
The idea behind the Sensitive Data Leak Alert, is a very efficient method of detecting when sensitive data is crossing the firewall. This method does not rely on the port number. Once the alert is triggered, the Internet connection could be shutdown, a trace could be put in place, security administrators could be paged, or any such action could be taken.
There are two methods Sensitive Data Leak Alert (SDLA) accomplishes this and both methods are based on the digital fingerprint of the payload.
The first method is to have a table of digital fingerprints of all data accessible to the public. As payloads cross the firewall headed towards the Internet, these...