11-07-2012, 04:30 PM
DATA LEAKAGE DETECTION
Data leakage detection.ppt (Size: 337 KB / Downloads: 75)
ABSTRACT
A data distributor has given sensitive data to a set of supposedly trusted agents.
Sometimes data is leaked and found in unauthorized place e.g., on the web or on somebody's laptop.
Data leakage happens every day when confidential business information are leaked out.
When these are leaked out it leaves the company unprotected and goes outside the jurisdiction of the corporation.
Motivation
In the past few years ,there has been a sharp increase in data leakage from many organizations.
According to 2006, the FBI computer crime and security survey, Data leakage is the greatest source of financial loss of organization.
The above issues motivated to me to choose this project.
Problem Statement
In the course of doing business, sometimes sensitive data must be given to trusted third parties. Some of the data is leaked and found in an unauthorized place.
The distributor cannot blame the agent without any evidence. This project identifies the agent who leaked the data with enough evidence.
Limitations of current system
Current approach can detect the hackers but the total number of evidence will be less and the organization may not be able to proceed legally for further proceedings due to lack of good amount of evidence and the chances to escape of hackers are high.
Optimization Module:
The Optimization Module is the distributor’s data allocation to agents has one constraint and one objective. The distributor’s constraint is to satisfy agents’ requests, by providing them with the number of objects they request or with all available objects that satisfy their conditions. His objective is to be able to detect an agent who leaks any portion of his data.
Data leakage detection.ppt (Size: 337 KB / Downloads: 75)
ABSTRACT
A data distributor has given sensitive data to a set of supposedly trusted agents.
Sometimes data is leaked and found in unauthorized place e.g., on the web or on somebody's laptop.
Data leakage happens every day when confidential business information are leaked out.
When these are leaked out it leaves the company unprotected and goes outside the jurisdiction of the corporation.
Motivation
In the past few years ,there has been a sharp increase in data leakage from many organizations.
According to 2006, the FBI computer crime and security survey, Data leakage is the greatest source of financial loss of organization.
The above issues motivated to me to choose this project.
Problem Statement
In the course of doing business, sometimes sensitive data must be given to trusted third parties. Some of the data is leaked and found in an unauthorized place.
The distributor cannot blame the agent without any evidence. This project identifies the agent who leaked the data with enough evidence.
Limitations of current system
Current approach can detect the hackers but the total number of evidence will be less and the organization may not be able to proceed legally for further proceedings due to lack of good amount of evidence and the chances to escape of hackers are high.
Optimization Module:
The Optimization Module is the distributor’s data allocation to agents has one constraint and one objective. The distributor’s constraint is to satisfy agents’ requests, by providing them with the number of objects they request or with all available objects that satisfy their conditions. His objective is to be able to detect an agent who leaks any portion of his data.