0% found this document useful (0 votes)
96 views13 pages

Data Leakage Detection Framework

This document describes a proposed system for secure data leakage detection and prevention over a LAN network. The system aims to more effectively detect and prevent data leaks compared to existing methods. It develops a model to assess the "guilt" of agents when data leaks are discovered. The system includes user enrollment, rule specification for data transfers, monitoring data transfers for rule matches, and alerting owners if leaks are detected while protecting data using fake objects. The goal is to identify leaking agents immediately using this detection and prevention framework.

Uploaded by

kokomomo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
96 views13 pages

Data Leakage Detection Framework

This document describes a proposed system for secure data leakage detection and prevention over a LAN network. The system aims to more effectively detect and prevent data leaks compared to existing methods. It develops a model to assess the "guilt" of agents when data leaks are discovered. The system includes user enrollment, rule specification for data transfers, monitoring data transfers for rule matches, and alerting owners if leaks are detected while protecting data using fake objects. The goal is to identify leaking agents immediately using this detection and prevention framework.

Uploaded by

kokomomo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd

A SECURE DATA LEAKAGE DETECTION PROTECTION SCHEME OVER LAN NETWORK

NAME : Bhuvaneshwari.C
[Link] : 201it012

Under the Guidance of


[Link] Msc.,[Link].,
Department of Information Techonology,
Kongunadu Arts And Science College,
Coimbatore.
ABSTRACT
 In the recent years data leakage is detected as a main problem in distributed network, which has
heterogeneous users. The increasing ability to trail and collect large amounts of data with the use of
technology has lead to an interest in the development of data protection algorithms which helps to
preserve user sensitive data’s in the distributed environment.
 There are several Data leakage Detection and Data Leakage Prevention techniques have been initiated
for securing and protecting data’s.
 A recently proposed technique addresses the issue of data leakage in transferred data’s by sampling
and matching techniques.
 However, the method can only perform detection part within the application level. There are several
other way to leak the transferred data within the host rather than the application.
 The proposed method designed and developed a new framework for distribution data
security, which has been developed in an email server for reconstruction secure email
transfers.
 This includes different types of algorithms to detect and prevent data leaks either partially
or fully. this is more effective than the currently available method in terms of the level of
information loss.
 The proposed approach performs prediction and probability finding in order to identify
and protect data from leakers.
SYSTEM SPECIFICATION

HARDWARE REQUIREMENT:
The hardware used for the development of the project is:
Processor : Intel Dual Core
RAM : 2GB
Hard disk : 20 GB
SOFTWARE REQUIREMENT:
The software used for the development of the project is:
Environment : Visual Studio .Net 2010
Front end : [Link]
Language : C# .Net
Back end : Sql Server 2008
EXISTING SYSTEM

 Traditionally, leakage detection is handled by watermarking, e.g., a unique code is embedded in


each distributed copy.
 If that copy is later discovered in the hands of an unauthorized party, the leaker can be identified.
 Watermarks can be very useful in some cases, but again, involve some modification of the original
data. Furthermore, watermarks can sometimes be destroyed if the data recipient is malicious.
DRAWBACKS :
 Data leakage could identify only through watermarking technique.
 The owner could identify the leakage of the data only when he received the same data.
 Possibility of detection was low.
 Time consuming process.
 Less efficiency.
 Need more methods to be implemented for accurate results.
PROPOSED SYSTEM

 It studies unobtrusive techniques for detecting leakage of a set of objects or records.


 After giving a set of objects to agents, the distributor discovers some of those same objects in an
unauthorized place.
 In this system, develops a model for assessing the “guilt” of agents.
 It also presents algorithms for distributing objects to agents, in a way that improves our chances of
identifying a leaker.
 Finally, it also consider the option of adding “fake” objects to the distributed set. Such objects do
not correspond to real entities but appear realistic to the agent.
 In a sense, the fake objects act as a type of watermark for the entire set, without modifying any
individual members.
 If it turns out that an agent was given one or more fake objects that were leaked, then the distributor
can be more confident that agent was guilty.
BENEFITS:
 Effective Data Leakage Detection and blocking.
 On spot leakage detection.
 The proposed protocol identifies the guilty agent immediately when data leaks.
 Efficiency and accuracy is high.
MODULES

 User Enrollment process


 Rule specification
 Data Transfer
 Rule matching
 Data Leak Protection and Alerting
MODULE DESCRIPTION

 USER ENROLLMENT PROCESS


This module helps users to register them with the application. Registration is mandatory since it is
required for them to view data and data transfer process. The user needs to select a username and
password at the time of registration and the username will be Unique. Here a user can have the
accessibility authority after the registration.
 RULE SPECIFICATION
While transmitting the secure data, the owner of the content can specify a list of rules. This
includes, forward rights, monitoring and restricting access of the data. The Rule Specification is
performed by the admin and the clients of the server. This monitors and restricts the data based on
the rules.
 DATA TRANSFER
This module is mainly designed to transfer data from one end to another end. all the transfer data
securely maintain by server. These details include file name, file size and file type, source,
destination info, etc.
 RULE MATCHING
The Rule matching process calculates the similarities between the source data and the transferred
data’s based on the rule set. This returns the similarity score of the documents in terms of
percentage. Based on the given threshold the data leak is described as partial leak or full leak.
 DATA LEAK PROTECTION AND ALERTING
The next process after monitoring suppose user try to leak the secure data means fake object
will send to receiver and also it will providing appropriate reports to the users and alerting
them about the guilty users with their probability ratio. The data security related alerts are
generated to the data owners.
THANK YOU

You might also like