SlideShare une entreprise Scribd logo
1  sur  31
Submitted By,
JOSNA KRISHNA
S7 CSE
ROLL No.:35
 INTRODUCTION
 SENSITIVE DATAS IN COMPANIES
 DATA LEAKAGE-------HOW???
 DANGER…
 TOWARDS SECURITY
 EXISTING SYSTEM
 PROPOSED SYSTEM
 INTO THE ALGORITHM
 CONCLUSION
DATA LEAKAGE:
Data leakage is the unauthorized
transmission of sensitive data or
information from within an organization
to an external destination .
•Intellectual Properties
•Financial Information
•Patient Information
•Personal Credit Card Data,
•& Other Information
Depending Upon the
Business and the industry.
•In the course of business, data must be
handed over to trusted 3rd Parties for
some operations.
•Sometimes these trusted 3rd
Parties may act as points of
Data leakage.
•Data Leakage mainly
happens due to
Human Errors.
•A hospital may give patient records to
researcher who will devise new treatment.
•Company may have partnership with other
companies that require sharing of customer
data.
•An enterprise may outsource
it’s data processing, so data
must be given to various other
companies.
•Number of leaked sensitive data records has
grown 10 times in recent years.
•Data leakage by accidents exceeds the risk posed
by vulnerable software.
•Sensitive data leakage is more in cases where
there is no End-to-End encryption (example: PGP-
Pretty Good Privacy)
•Prevent clear text sensitive Data from Direct Access.
•Deploy a Screening Tool:
-To scan computer file systems.
-To scan server storage.
-Inspect outbound network traffic.
•Data leak detection differs from AntiVirus and Network
Intrusion Detection System (AV&NIDS).
->New security requirements
&
->Algorithmic Challenges.
Algorithmic Challenges:
-Data Transformation
-Scalability
•Direct usage of Automata-based string matching
is not possible.
It is based on Set Intersection.
Operation performed on 2 sets
of n-grams.
One from content and one from sensitive data.
This method is used to detect similar
documents on:
•The web.
•Shared malicious traffic pattern.
•Malware.
•E-mail spam.
 Symantec DLP
 Identity Finder
 Global Velocity
 GoCloud DLP etc.
Set Intersection is order less.
(Ordering of shared n-grams is not analyzed)
Generates false alerts.
(When n is set to small value)
Cannot detect the partial data leakage.
It is not an adequate method.
This one is holding sequential alignment
algorithm.
Executed on :
•Sampled sensitive data sequence.
•Sampled content being inspected.
Alignment produces the amount of sensitive data
in a content.
More accuracy is achieved.
Scalability issue is solved by sampling both the
Sensitive Data & Content Sequence before aligning.
A pair of algorithms is used:
•Comparable Sampling Algorithm
•Sampling Oblivious Alignment Algorithm
High detection specificity.
Pervasive & localized modifications.
o The Comparable Sampling Algorithm yields
constant samples of a sequence wherever
the sampling starts and ends
o The Sampling Oblivious Alignment
Algorithm infers the similarity between the
original unsampled sequence with
sophisticated techniques through dynamic
programming.
 In this method, both sensitive data &
content sequence are sampled.
 The alignment is performed on sampled
sequences
 Here, a ‘Comparable Sampling’ property is
used.
 Both the algorithms performs more faster
on a GPU than a CPU.
 Promises high speed security scanning.
INTO THE ALGORITHMS 
Requirements:
Definition 1: A substring is a consecutive
segment of the original string.
Definition 2: A subsequence does not
require its items to be consecutive in the
original string.
Definition 3: Given string x is substring
of y ,comparable sampling on x and y
yields x’ and y’. x’ is similar to a
substring of y’.
Definition 4: Given x as a substring of
y, a subsequence preserving sampling on
x and y yield two subsequences x’ and y’
,so that x’ is substring of y’.
 It is deterministic and subsequence
preserving.
 This algorithm is unbiased.
 It yields a constant samples of a
sequence wherever the sampling starts
and ends.
 Input: an array S of items, a size |w| for a sliding
window w, a
 selection function f (w, N) that selects N smallest
items from a
 window w, i.e., f = min(w, N)
 Output: a sampled array T
 1: initialize T as an empty array of size |S|
 2: w ←read(S, |w|)
 3: let w.head and w.tail be indices in S
corresponding to the
 higher-indexed end and lower-indexed end of w,
respectively
 4: collection mc ← min(w, N)
 5: while w is within the boundary of S do
 6: mp ←mc
 7: move w toward high index by 1
 8: mc ← min(w, N)
 9: if mc = mp then
 10: item en ← collectionDiff (mc,mp)
 11: item eo ← collectionDiff (mp,mc)
 12: if en < eo then
 13: write value en to T at w.head’s position
 14: else
 15: write value eo to T at w.tail’s position
 16: end if
 17: end if
 18: end while
We set our sampling procedure with a sliding window
of size 6 (i.e., |w| = 6) and N= 3. The input
sequence is 1,5,1,9,8,5,3,2,4,8. The initial window
w= [1,5,1,9,8,5] and collection mc = sliding{1,1,5}.
 The complexity of selection function is
O(n log|w|) or O(n),where n is the size of
input, |w| is the size of the window.
 The factor O(log|w|) comes from
maintaining the smallest N items within
the window.
Requirements:
The algorithm runs on compact sampled sequences L .
Extra fields for scoring matrix cells in dynamic
programming.
Extra step in recurrence relation for updating the null
region.
Complex weight function computes similarities
between two null region.
 Order –aware comparison
 High Tolerance to pattern variation
 Capability of detecting partial leaks
 Consistent
 Input: A weight function fw, visited cells in
H matrix that are
adjacent to H(i, j ): H(i −1, j −1), H(i, j −1),
and H(i −1, j ),
and the i -th and j -th items Lai,Lbj
in two sampled sequences La
and Lb, respectively.
•Presented here is a content inspection technique
for sensitive data leakage.
•Detection approach is based on aligning 2
samples for similarity comparison.
•Our alignment method is useful for common data
scenarios.
Fast detection of transformed data leaks[mithun_p_c]

Contenu connexe

Tendances

Detecting Phishing using Machine Learning
Detecting Phishing using Machine LearningDetecting Phishing using Machine Learning
Detecting Phishing using Machine Learningijtsrd
 
Message authentication
Message authenticationMessage authentication
Message authenticationCAS
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrimepatelripal99
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectionkalpesh1908
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture NotesFellowBuddy.com
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distributionRiya Choudhary
 
Cyber Security - Unit - 2 - Network Defense tools Firewalls and Packet Filters
Cyber Security - Unit - 2 - Network Defense tools Firewalls and Packet FiltersCyber Security - Unit - 2 - Network Defense tools Firewalls and Packet Filters
Cyber Security - Unit - 2 - Network Defense tools Firewalls and Packet FiltersGyanmanjari Institute Of Technology
 
PHISHING DETECTION
PHISHING DETECTIONPHISHING DETECTION
PHISHING DETECTIONumme ayesha
 
ALOHA Protocol (in detail)
ALOHA Protocol (in detail)ALOHA Protocol (in detail)
ALOHA Protocol (in detail)Hinal Lunagariya
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9koolkampus
 
Mandatory access control for information security
Mandatory access control for information securityMandatory access control for information security
Mandatory access control for information securityAjit Dadresa
 
Network sniffers & injection tools
Network sniffers  & injection toolsNetwork sniffers  & injection tools
Network sniffers & injection toolsvishalgohel12195
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanismsRajapriya82
 
CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)Sam Bowne
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithmBushra M
 
Legal aspects of digital forensics
Legal aspects of digital forensics Legal aspects of digital forensics
Legal aspects of digital forensics KakshaPatel3
 

Tendances (20)

Detecting Phishing using Machine Learning
Detecting Phishing using Machine LearningDetecting Phishing using Machine Learning
Detecting Phishing using Machine Learning
 
Message authentication
Message authenticationMessage authentication
Message authentication
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
 
Network security and viruses
Network security and virusesNetwork security and viruses
Network security and viruses
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
 
Cyber Security - Unit - 2 - Network Defense tools Firewalls and Packet Filters
Cyber Security - Unit - 2 - Network Defense tools Firewalls and Packet FiltersCyber Security - Unit - 2 - Network Defense tools Firewalls and Packet Filters
Cyber Security - Unit - 2 - Network Defense tools Firewalls and Packet Filters
 
PHISHING DETECTION
PHISHING DETECTIONPHISHING DETECTION
PHISHING DETECTION
 
IoT-A ARM
IoT-A ARMIoT-A ARM
IoT-A ARM
 
ALOHA Protocol (in detail)
ALOHA Protocol (in detail)ALOHA Protocol (in detail)
ALOHA Protocol (in detail)
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9
 
Mandatory access control for information security
Mandatory access control for information securityMandatory access control for information security
Mandatory access control for information security
 
Network sniffers & injection tools
Network sniffers  & injection toolsNetwork sniffers  & injection tools
Network sniffers & injection tools
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanisms
 
CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
Legal aspects of digital forensics
Legal aspects of digital forensics Legal aspects of digital forensics
Legal aspects of digital forensics
 

En vedette

Data leakage detection Complete Seminar
Data leakage detection Complete SeminarData leakage detection Complete Seminar
Data leakage detection Complete SeminarSumit Thakur
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectionrejii
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectionMohit Pandey
 
data-leakage-detection
data-leakage-detectiondata-leakage-detection
data-leakage-detectionNagendra Kumar
 
Data leakage detection (synopsis)
Data leakage detection (synopsis)Data leakage detection (synopsis)
Data leakage detection (synopsis)Mumbai Academisc
 
Data Leakage Detection
Data Leakage DetectionData Leakage Detection
Data Leakage DetectionAshwini Nerkar
 
Data leakage detection
Data leakage detection Data leakage detection
Data leakage detection Suveeksha
 
SGIP Webinar “Regulatory Commission Members Discuss How SGIP Helps Shape Sm...
SGIP Webinar  “Regulatory Commission Members Discuss How SGIP Helps Shape  Sm...SGIP Webinar  “Regulatory Commission Members Discuss How SGIP Helps Shape  Sm...
SGIP Webinar “Regulatory Commission Members Discuss How SGIP Helps Shape Sm...Smart Grid Interoperability Panel
 
Jpdcs1 data leakage detection
Jpdcs1 data leakage detectionJpdcs1 data leakage detection
Jpdcs1 data leakage detectionChaitanya Kn
 
Fpga implementation of fusion technique for fingerprint application
Fpga implementation of fusion technique for fingerprint applicationFpga implementation of fusion technique for fingerprint application
Fpga implementation of fusion technique for fingerprint applicationIAEME Publication
 
Proyecto de vida_jhoz
Proyecto de vida_jhozProyecto de vida_jhoz
Proyecto de vida_jhozResuge98
 
Blog historia espe
Blog historia espeBlog historia espe
Blog historia espeResuge98
 
CURRICULUM_VITAE-Mahesh latest
CURRICULUM_VITAE-Mahesh latestCURRICULUM_VITAE-Mahesh latest
CURRICULUM_VITAE-Mahesh latestmahesh reddy
 

En vedette (20)

Data leakage detection Complete Seminar
Data leakage detection Complete SeminarData leakage detection Complete Seminar
Data leakage detection Complete Seminar
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
data-leakage-detection
data-leakage-detectiondata-leakage-detection
data-leakage-detection
 
Data leakage detection (synopsis)
Data leakage detection (synopsis)Data leakage detection (synopsis)
Data leakage detection (synopsis)
 
Data Leakage Detection
Data Leakage DetectionData Leakage Detection
Data Leakage Detection
 
Data leakage detection
Data leakage detection Data leakage detection
Data leakage detection
 
Seminar presentation on 5G
Seminar presentation on 5GSeminar presentation on 5G
Seminar presentation on 5G
 
Gym
GymGym
Gym
 
SGIP Webinar “Regulatory Commission Members Discuss How SGIP Helps Shape Sm...
SGIP Webinar  “Regulatory Commission Members Discuss How SGIP Helps Shape  Sm...SGIP Webinar  “Regulatory Commission Members Discuss How SGIP Helps Shape  Sm...
SGIP Webinar “Regulatory Commission Members Discuss How SGIP Helps Shape Sm...
 
web services
web servicesweb services
web services
 
Asset Tracking on the Android Smartphone
Asset Tracking on the Android SmartphoneAsset Tracking on the Android Smartphone
Asset Tracking on the Android Smartphone
 
Jpdcs1 data leakage detection
Jpdcs1 data leakage detectionJpdcs1 data leakage detection
Jpdcs1 data leakage detection
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Fpga implementation of fusion technique for fingerprint application
Fpga implementation of fusion technique for fingerprint applicationFpga implementation of fusion technique for fingerprint application
Fpga implementation of fusion technique for fingerprint application
 
Proyecto de vida_jhoz
Proyecto de vida_jhozProyecto de vida_jhoz
Proyecto de vida_jhoz
 
Blog historia espe
Blog historia espeBlog historia espe
Blog historia espe
 
Secuencia 112
Secuencia 112Secuencia 112
Secuencia 112
 
CAPM 1.1
CAPM 1.1CAPM 1.1
CAPM 1.1
 
CURRICULUM_VITAE-Mahesh latest
CURRICULUM_VITAE-Mahesh latestCURRICULUM_VITAE-Mahesh latest
CURRICULUM_VITAE-Mahesh latest
 

Similaire à Fast detection of transformed data leaks[mithun_p_c]

AN ALTERNATIVE APPROACH FOR SELECTION OF PSEUDO RANDOM NUMBERS FOR ONLINE EXA...
AN ALTERNATIVE APPROACH FOR SELECTION OF PSEUDO RANDOM NUMBERS FOR ONLINE EXA...AN ALTERNATIVE APPROACH FOR SELECTION OF PSEUDO RANDOM NUMBERS FOR ONLINE EXA...
AN ALTERNATIVE APPROACH FOR SELECTION OF PSEUDO RANDOM NUMBERS FOR ONLINE EXA...cscpconf
 
Anomaly detection Full Article
Anomaly detection Full ArticleAnomaly detection Full Article
Anomaly detection Full ArticleMenglinLiu1
 
Supervised and unsupervised learning
Supervised and unsupervised learningSupervised and unsupervised learning
Supervised and unsupervised learningAmAn Singh
 
Interpolation Missing values.pptx
Interpolation Missing values.pptxInterpolation Missing values.pptx
Interpolation Missing values.pptxRushikeshGore18
 
Performance Analysis of Different Clustering Algorithm
Performance Analysis of Different Clustering AlgorithmPerformance Analysis of Different Clustering Algorithm
Performance Analysis of Different Clustering AlgorithmIOSR Journals
 
Probability and random processes project based learning template.pdf
Probability and random processes project based learning template.pdfProbability and random processes project based learning template.pdf
Probability and random processes project based learning template.pdfVedant Srivastava
 
interpolation-and-its-application-180107160107.pptx
interpolation-and-its-application-180107160107.pptxinterpolation-and-its-application-180107160107.pptx
interpolation-and-its-application-180107160107.pptxSomitSamanto1
 
Interpolation and-its-application
Interpolation and-its-applicationInterpolation and-its-application
Interpolation and-its-applicationApurbo Datta
 
Classifiers
ClassifiersClassifiers
ClassifiersAyurdata
 
Unit III_Ch 17_Probablistic Methods.pptx
Unit III_Ch 17_Probablistic Methods.pptxUnit III_Ch 17_Probablistic Methods.pptx
Unit III_Ch 17_Probablistic Methods.pptxsmithashetty24
 
Data Structures - Lecture 1 [introduction]
Data Structures - Lecture 1 [introduction]Data Structures - Lecture 1 [introduction]
Data Structures - Lecture 1 [introduction]Muhammad Hammad Waseem
 
` Traffic Classification based on Machine Learning
` Traffic Classification based on Machine Learning ` Traffic Classification based on Machine Learning
` Traffic Classification based on Machine Learning butest
 
Application of Machine Learning in Agriculture
Application of Machine  Learning in AgricultureApplication of Machine  Learning in Agriculture
Application of Machine Learning in AgricultureAman Vasisht
 
Deep learning MindMap
Deep learning MindMapDeep learning MindMap
Deep learning MindMapAshish Patel
 
Introduction of data science
Introduction of data scienceIntroduction of data science
Introduction of data scienceTanujaSomvanshi1
 

Similaire à Fast detection of transformed data leaks[mithun_p_c] (20)

AN ALTERNATIVE APPROACH FOR SELECTION OF PSEUDO RANDOM NUMBERS FOR ONLINE EXA...
AN ALTERNATIVE APPROACH FOR SELECTION OF PSEUDO RANDOM NUMBERS FOR ONLINE EXA...AN ALTERNATIVE APPROACH FOR SELECTION OF PSEUDO RANDOM NUMBERS FOR ONLINE EXA...
AN ALTERNATIVE APPROACH FOR SELECTION OF PSEUDO RANDOM NUMBERS FOR ONLINE EXA...
 
Anomaly detection Full Article
Anomaly detection Full ArticleAnomaly detection Full Article
Anomaly detection Full Article
 
Supervised and unsupervised learning
Supervised and unsupervised learningSupervised and unsupervised learning
Supervised and unsupervised learning
 
Neural networks
Neural networksNeural networks
Neural networks
 
Interpolation Missing values.pptx
Interpolation Missing values.pptxInterpolation Missing values.pptx
Interpolation Missing values.pptx
 
Performance Analysis of Different Clustering Algorithm
Performance Analysis of Different Clustering AlgorithmPerformance Analysis of Different Clustering Algorithm
Performance Analysis of Different Clustering Algorithm
 
F017132529
F017132529F017132529
F017132529
 
Python for Data Science
Python for Data SciencePython for Data Science
Python for Data Science
 
Probability and random processes project based learning template.pdf
Probability and random processes project based learning template.pdfProbability and random processes project based learning template.pdf
Probability and random processes project based learning template.pdf
 
interpolation-and-its-application-180107160107.pptx
interpolation-and-its-application-180107160107.pptxinterpolation-and-its-application-180107160107.pptx
interpolation-and-its-application-180107160107.pptx
 
Interpolation and-its-application
Interpolation and-its-applicationInterpolation and-its-application
Interpolation and-its-application
 
Classifiers
ClassifiersClassifiers
Classifiers
 
Cerdit card
Cerdit cardCerdit card
Cerdit card
 
Unit III_Ch 17_Probablistic Methods.pptx
Unit III_Ch 17_Probablistic Methods.pptxUnit III_Ch 17_Probablistic Methods.pptx
Unit III_Ch 17_Probablistic Methods.pptx
 
Data Structures - Lecture 1 [introduction]
Data Structures - Lecture 1 [introduction]Data Structures - Lecture 1 [introduction]
Data Structures - Lecture 1 [introduction]
 
` Traffic Classification based on Machine Learning
` Traffic Classification based on Machine Learning ` Traffic Classification based on Machine Learning
` Traffic Classification based on Machine Learning
 
Application of Machine Learning in Agriculture
Application of Machine  Learning in AgricultureApplication of Machine  Learning in Agriculture
Application of Machine Learning in Agriculture
 
Workshop on Bayesian Workflows with CmdStanPy by Mitzi Morris
Workshop on Bayesian Workflows with CmdStanPy by Mitzi MorrisWorkshop on Bayesian Workflows with CmdStanPy by Mitzi Morris
Workshop on Bayesian Workflows with CmdStanPy by Mitzi Morris
 
Deep learning MindMap
Deep learning MindMapDeep learning MindMap
Deep learning MindMap
 
Introduction of data science
Introduction of data scienceIntroduction of data science
Introduction of data science
 

Dernier

result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 

Dernier (20)

result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 

Fast detection of transformed data leaks[mithun_p_c]

  • 2.  INTRODUCTION  SENSITIVE DATAS IN COMPANIES  DATA LEAKAGE-------HOW???  DANGER…  TOWARDS SECURITY  EXISTING SYSTEM  PROPOSED SYSTEM  INTO THE ALGORITHM  CONCLUSION
  • 3. DATA LEAKAGE: Data leakage is the unauthorized transmission of sensitive data or information from within an organization to an external destination .
  • 4. •Intellectual Properties •Financial Information •Patient Information •Personal Credit Card Data, •& Other Information Depending Upon the Business and the industry.
  • 5. •In the course of business, data must be handed over to trusted 3rd Parties for some operations. •Sometimes these trusted 3rd Parties may act as points of Data leakage. •Data Leakage mainly happens due to Human Errors.
  • 6. •A hospital may give patient records to researcher who will devise new treatment. •Company may have partnership with other companies that require sharing of customer data. •An enterprise may outsource it’s data processing, so data must be given to various other companies.
  • 7.
  • 8. •Number of leaked sensitive data records has grown 10 times in recent years. •Data leakage by accidents exceeds the risk posed by vulnerable software. •Sensitive data leakage is more in cases where there is no End-to-End encryption (example: PGP- Pretty Good Privacy)
  • 9. •Prevent clear text sensitive Data from Direct Access. •Deploy a Screening Tool: -To scan computer file systems. -To scan server storage. -Inspect outbound network traffic. •Data leak detection differs from AntiVirus and Network Intrusion Detection System (AV&NIDS).
  • 10. ->New security requirements & ->Algorithmic Challenges. Algorithmic Challenges: -Data Transformation -Scalability •Direct usage of Automata-based string matching is not possible.
  • 11. It is based on Set Intersection. Operation performed on 2 sets of n-grams. One from content and one from sensitive data. This method is used to detect similar documents on: •The web. •Shared malicious traffic pattern. •Malware. •E-mail spam.
  • 12.  Symantec DLP  Identity Finder  Global Velocity  GoCloud DLP etc.
  • 13. Set Intersection is order less. (Ordering of shared n-grams is not analyzed) Generates false alerts. (When n is set to small value) Cannot detect the partial data leakage. It is not an adequate method.
  • 14. This one is holding sequential alignment algorithm. Executed on : •Sampled sensitive data sequence. •Sampled content being inspected. Alignment produces the amount of sensitive data in a content. More accuracy is achieved.
  • 15. Scalability issue is solved by sampling both the Sensitive Data & Content Sequence before aligning. A pair of algorithms is used: •Comparable Sampling Algorithm •Sampling Oblivious Alignment Algorithm High detection specificity. Pervasive & localized modifications.
  • 16. o The Comparable Sampling Algorithm yields constant samples of a sequence wherever the sampling starts and ends o The Sampling Oblivious Alignment Algorithm infers the similarity between the original unsampled sequence with sophisticated techniques through dynamic programming.
  • 17.  In this method, both sensitive data & content sequence are sampled.  The alignment is performed on sampled sequences  Here, a ‘Comparable Sampling’ property is used.  Both the algorithms performs more faster on a GPU than a CPU.  Promises high speed security scanning.
  • 19. Requirements: Definition 1: A substring is a consecutive segment of the original string. Definition 2: A subsequence does not require its items to be consecutive in the original string.
  • 20. Definition 3: Given string x is substring of y ,comparable sampling on x and y yields x’ and y’. x’ is similar to a substring of y’. Definition 4: Given x as a substring of y, a subsequence preserving sampling on x and y yield two subsequences x’ and y’ ,so that x’ is substring of y’.
  • 21.  It is deterministic and subsequence preserving.  This algorithm is unbiased.  It yields a constant samples of a sequence wherever the sampling starts and ends.
  • 22.  Input: an array S of items, a size |w| for a sliding window w, a  selection function f (w, N) that selects N smallest items from a  window w, i.e., f = min(w, N)  Output: a sampled array T  1: initialize T as an empty array of size |S|  2: w ←read(S, |w|)  3: let w.head and w.tail be indices in S corresponding to the  higher-indexed end and lower-indexed end of w, respectively  4: collection mc ← min(w, N)  5: while w is within the boundary of S do
  • 23.  6: mp ←mc  7: move w toward high index by 1  8: mc ← min(w, N)  9: if mc = mp then  10: item en ← collectionDiff (mc,mp)  11: item eo ← collectionDiff (mp,mc)  12: if en < eo then  13: write value en to T at w.head’s position  14: else  15: write value eo to T at w.tail’s position  16: end if  17: end if  18: end while
  • 24. We set our sampling procedure with a sliding window of size 6 (i.e., |w| = 6) and N= 3. The input sequence is 1,5,1,9,8,5,3,2,4,8. The initial window w= [1,5,1,9,8,5] and collection mc = sliding{1,1,5}.
  • 25.  The complexity of selection function is O(n log|w|) or O(n),where n is the size of input, |w| is the size of the window.  The factor O(log|w|) comes from maintaining the smallest N items within the window.
  • 26. Requirements: The algorithm runs on compact sampled sequences L . Extra fields for scoring matrix cells in dynamic programming. Extra step in recurrence relation for updating the null region. Complex weight function computes similarities between two null region.
  • 27.  Order –aware comparison  High Tolerance to pattern variation  Capability of detecting partial leaks  Consistent
  • 28.  Input: A weight function fw, visited cells in H matrix that are adjacent to H(i, j ): H(i −1, j −1), H(i, j −1), and H(i −1, j ), and the i -th and j -th items Lai,Lbj in two sampled sequences La and Lb, respectively.
  • 29.
  • 30. •Presented here is a content inspection technique for sensitive data leakage. •Detection approach is based on aligning 2 samples for similarity comparison. •Our alignment method is useful for common data scenarios.