data-leakage-detection

16
ity women’s college of ngineering & Technology A Technical seminar On Data leakage detection

Upload: nagendra-kumar

Post on 07-May-2015

3.747 views

Category:

Education


0 download

DESCRIPTION

data leakage detection

TRANSCRIPT

Page 1: data-leakage-detection

City women’s college of Engineering & Technology

A Technical seminar On

Data leakage detection

Page 2: data-leakage-detection

DATA LEAKAGE DETECTION

BY :

AFSHAN KHATOON(095X1A0503)

DEPT. OF CSE

Page 3: data-leakage-detection

INTRODUCTIONISSUESSCOPEANALYSISDESIGNIMPLEMENTATIONS

Page 4: data-leakage-detection

DATA LEAKAGE DETECTION

To detect whether data has been leaked by agents.

To prevent data leakage.

Page 5: data-leakage-detection

INTRODUCTION

In the course of doing

business, sometimes

sensitive data must be

handed over to supposedly

trusted third parties.

Our goal is to detect when

the distributor's sensitive

data has been leaked by

agents, and if possible to

identify the agent that

leaked the data.

Page 6: data-leakage-detection

EXISTING SYSTEM•WATERMARKING

PROPOSED SYSTEM

Page 7: data-leakage-detection

PROPOSED SYSTEM . In the course of doing business, sometimes sensitive data must be handed over to supposedly trusted third parties. Our goal is to detect when thedistributor's sensitive data has beenleaked by agents, and if possible toidentify the agent that leaked the data.

Page 8: data-leakage-detection

Types of employees that put your company at risk

The security illiterate

The gadget nerds

The unlawful residents

The malicious/disgruntled employees

Page 9: data-leakage-detection

Distributor (D) is a system which will distribute data to agents Valuable Data (T) is the set of sensitive data which the system is

going to send to the agents Agent (U) is the set of agents to whom the system is going to send

sensitive data. Request from client will be either sample request or explicit request.

Analysis

Page 10: data-leakage-detection

ARCHITECTURE DIAGRAM:

Data Distributor

Agents

Agents Requesting Secured data from the Data Distributor

Requesting sensitive data

Page 11: data-leakage-detection

ARCHITECTURE DIAGRAM:

Data distributor sending the secured data to the agents

Sensitive data is sent

Data Distributor

Agents

Page 12: data-leakage-detection

Internet

The Sent e-mail don’t contains fake Object/Watermarks.

Forwarded to the

outside world

Agent tries to leak the sensitive data

Page 13: data-leakage-detection

The Sent e-mail contains fake

Object/Watermarks.

Internet

Infected e-mail

containing fake

object

Agent tries to leak the sensitive data

Page 14: data-leakage-detection

ImplementationThe system has the following

• Data Allocation -- approach same as watermarking -- less sensitive -- add fake object in some cases

• Fake Object -- Are real looking object -- Should not affect data -- Limit on fake object insertion(e-mail inbox) -- CREATEFAKEOBJECT (Ri, Fi, CONDi)

Page 15: data-leakage-detection

CONCLUSION

In the real scenario there is no need to hand over the sensitive data to the agents who will unknowingly or maliciously leak it.

However, in many cases, we must indeed work with agents that may not be 100 percent trusted, and we may not be certain if a leaked object came from an agent or from some other source.

In spite of these difficulties, it is possible to assess the likelihood that an agent is responsible for a leak, based on the overlap of his data with the leaked data .

The algorithms we have presented implement a variety of data distribution strategies that can improve the distributor’s chances of identifying a leaker.

Page 16: data-leakage-detection