DATA LEAKAGE
DETCTION SYSTEM
Presented By Team A9:-
Anurag Thakur(20CSE036)
Neeraj Kumar(20CSE054)
Ananya Dash(20CSE063)
Class Teacher:- Mr.Anil Kumar Meher
Project co-ordinator:- Bhavani Shankar Panda
HOD:-Dr. Sanjay Kumar Kuanar
ABSTRACT:
• Data leakage is an uncontrolled or unauthorized transmission of
classified information to the outside.
•A data distributor has given sensitive data to a set of supposedly
trusted agents(third parties).
•It poses a serious problem to companies as the cost of incidents
continues to increase.
•The purpose of this project is to design and implement a data
leakage detection system based on special information retrieval
models and methods.
OBJECTIVES:
•A data distributor has given sensitive data to a set of supposedly trusted
agents(third parties).
•Some of the data is leaked and found in an unauthorized place.
•The distributor must assess the likelihood that the leaked data came from
one or more agents, as opposed to having been independently gathered by
other means.
•We propose data allocation strategies (across the agents) that improve the
probability of identifying leakages.
•These methods do not rely on alterations of the released data . In some
cases we can also inject “realistic but fake” data records to further improve
our chances of detecting leakage and identifying the guilty party.
•Our goal is to detect when the distributor’s sensitive data has been leaked
by agents, and if possible to identify the agent that leaked the data.
EXISTING SYSTEM:
Traditionally, leakage detection is handled by watermarking, e.g., a unique code
is embedded in each distributed copy.
If that copy is later discovered in the hands of an unauthorized party, the leaker
can be identified.
PROPOSED SYSTEM:
• Our goal is to detect when the distributor's sensitive data has been leaked
by agents, and identify the agent that leaked the data.
Watermarking is a very useful technique where the data is modified and
made "less sensitive" before being handed to agents.
We develop unobtrusive techniques for detecting leakage of a set of objects
or records.
We develop a model for assessing the "guilt" of agents.
We also present algorithms for distributing objects to agents, in a way that
improves our chances of identifying a leaker.
PROPOSED SYSTEM:
Software Requirements:
•Language : PHP
•IDE :VISUAL STUDIO
•Operating System :WINDOWS 10 & 11
•Technology :ASP.NET
•Backend :MY SQL
HARDWARE REQUIREMENTS:
•INTEL PROCESSOR
•RAM (512 MB)
•HARDDISK (40 GB)
•RGB KEYBOARD
•MONITOR
FLOW CHART:
BLOCK DIAGRAM:
HOME:
•This is the main page of our project.
•It contains all the options for next page.
UPLOAD ARTICLE:
Here, we can upload the article related to any field.
View file:
Registration :