• Case II Malicious data leak: A rogue insider or a piece of
stealthy software may steal sensitive personal or organizational
data from a host. Because the malicious adversary
can use strong private encryption, steganography or covert
channels to disable content-based traffic inspection, this
type of leaks is out of the scope of our network-based
solution. Host-based defenses (such as detecting the
infection onset [14]) need to be deployed instead.