15-09-2014, 03:43 PM
Data Leakage Detection And e-mail Filtering
Data Leakage Detection.ppt (Size: 1.67 MB / Downloads: 159)
Introduction
In the course of doing business, sometimes sensitive data must be handed over to supposedly trusted third parties.
Our goal is to detect when the distributor's sensitive data has been leaked by agents, and if possible to identify the agent that leaked the data.
Proposed System
In this system the leakage of data is detected by generating fake objects .
Data leakage prevention and detection of guilty agents is handled by e-mail filtering.
Analysis
Distributor (D) is a system which will distribute data to agents
Valuable Data (T) is the set of sensitive data which the system is going to send to the agents
Agent (U) is the set of agents to whom the system is going to send sensitive data.
Request from client will be either sample request or explicit request.
Implementation
The system has the following
Data Allocation
-- approach same as watermarking
-- less sensitive
-- add fake object in some cases
Fake Object
-- Are real looking object
-- Should not affect data
-- Limit on fake object insertion(e-mail inbox)
-- CREATEFAKEOBJECT (Ri, Fi, CONDi)
e-mail Filtering
Algorithm:
Identify the data.
Remove spamming stopping words.
Remove or change the synonyms.
Calculate the priority of the word depending upon the sensitivity of the data.
Compare data with predefine company data sets.
Filter the data if it has company’s important data sets.
Conclusion
In the real scenario there is no need to hand over the sensitive data to the agents who will unknowingly or maliciously leak it.
However, in many cases, we must indeed work with agents that may not be 100 percent trusted, and we may not be certain if a leaked object came from an agent or from some other source.
In spite of these difficulties, it is possible to assess the likelihood that an agent is responsible for a leak, based on the overlap of his data with the leaked data .
The algorithms we have presented implement a variety of data distribution strategies that can improve the distributor’s chances of identifying a leaker.