SlideShare une entreprise Scribd logo
1  sur  7
Télécharger pour lire hors ligne
ROBUST DATA LEAKAGE AND EMAIL FILTERING SYSTEM



OBJECTIVE:

      The main objective of this project is to identify the guilty agents who are
leaking the sensitive information or data by using explicit data request and sample
data request algorithm and also Email Filtering is done by using K-nearest
neighbor algorithm.

PROBLEM DIFINITION:

           Data leakage detection is being handled by the technique of
            watermarking.

           If the watermarking technique is used then the code which is
            embedded in the data can be modified because of which it becomes
            very difficult to identify the guilt agent or leaker.

           Data Allocation Problem.

           Data allocation depends on the request done by the agent and whether
            system can add fake object to it.

ABSTRACT:

      Data leakage can be elaborated as in whena data distributor has given
sensitive data to a set ofsupposedly trusted agents and some of the data isleaked
and found in an unauthorized place. Anenterprise data leak is a scary proposition.
Securitypractitioners have always had to deal with dataleakage issues that arise
from various ways like email,1M and other Internet channels. In case ofdata
leakage from trusted agents, the distributormust assess the likelihood that the
leaked datacame from one or more agents.


      This can be doneby using a system which can identify those partieswho are
guilty for such leakage even when data isaltered. For this the system can use data
allocationstrategies or can also inject "realistic but fake" datarecords to improve
identification of leakage.Moreover, data can also be leaked from withinan
organization through e-mails. Hence, there isalso a need to filter these e-mails.This
can be doneby blocking e-mails which contains images, videos orsensitive data for
an organization. Principle used ine- mail filtering is we classify e-mail basedthe
fingerprints of message bodies, the white andblack lists of email addresses and the
words specificto spam.


EXISTING SYSTEM:


      In Existing system, watermarking technique is used to identify the guilty
agents who are leaking the sensitive information or data.
          Watermarking is one of the old techniques which contain a unique
             code. This unique code is embedded in each copy which is then
             distributed to the clients by the user.
          If any particularclient leaks the given data to the third parties i.e.
             unauthorized users, then this leaked data and the leaker can be
             identified by the means of this watermarking technique.
DISADVANTAGES:

          However, in some cases it is important not to alter the original
             distributor’s data.
            Traditionally, leakage detection is handled by watermarking, e.g., a
            unique code is embedded in each distributed copy.
          If that copy is later discovered in the hands of an unauthorized party,
             the leaker can be identified.
          Watermarks can be very useful in some cases, but again, involve some
             modification of the original data.
          Watermarks can sometimes be destroyed if the data recipient is
             malicious.


PROPOSED SYSTEM:


      Themain aim of the proposed system is to find out when andwho has leaked
the sensitive data.In the proposed system; it is going to implement theconcept of
"Fake Objects". Now if suppose the directorof the company wants to share some
sensitive data(records) with clients of his company but he does notwant his data to
be leaked anywhere in between. Sobefore sending the sensitive data to the clients
what theproposed system will do is it will add fake objects(record) in database
which will exactly look like originaldata. The Client will be unaware of these fake
objects.Only the director of company knows that where andhow many fake objects
are inserted.The system is going to use different modules for addingfake objects
and for detecting fake objects.
In worst case if agent modifies the database (deleted somerecords) and then
leaks the data then also system willmake sure that fake object will be there to
detect the guilty agent.Also implementation concept of email filtering modulein
which if agent tries to e-mail the sensitive data thenfirst the request will go to the
server and then it willcheck for fake objects in that data, and if that data issensitive
data then that e-mail will automaticallydropped. Client will not be able to send the
e-mail.


ADVANTAGES:


           If the distributor sees “enough evidence” that an agent leaked data, he
             may stop doing business with him, or may initiate legal proceedings.
           In this project we develop a model for assessing the “guilt” of agents.
           We also present algorithms for distributing objects to agents, in a way
             that improves our chances of identifying a leaker.
           Finally, we also consider the option of adding “fake” objects to the
             distributed set. Such objects do not correspond to real entities but
             appear.
           If it turns out an agent was given one or more fake objects that were
             leaked, then the distributor can be more confident that agent was
             guilty.
           Agent will not be able to send sensitive data through e-mail.
ALGORITHM USED:
           1. Explicit Data Request
           2. Sample Data Request
           3. A-Priori Algorithm


  ARCHITECTURE DIAGRAM:



Client 1          Client 2              Client 3          Client n




                                                                      E-Mail
                    Data Leakage Detection
                                                                     Filtering
                            System
                                                                     Module
                                          Non-sensitive                      Sensitive data
                                              data
                                                                                        E-Mail
                             Firewall                      E-Mail Sent                 Discarded
                                                           Successfully


                         Internet
SYSTEM REQUIREMENTS:

    Hardware Requirements:

                   Intel Pentium iv
                   256/512 MB RAM
                   1 GB free disk space or greater
                   1 network interface card (NIC)

    Software Requirements:

                   MS Windows XP
                   MS IE Browser 6.0/later
                   MS Dot Net Framework 4.0
                   MS Visual Studio.NET 2010
                   Internet Information Server (IIS)
                   MS SQL Server 2005
                   Language :ASP.Net(C#.NET)


APPLICATIONS:


              1. Consultancy
              2. Real Estate
              3. Banks
Psdot 13 robust data leakage and email filtering system

Contenu connexe

Tendances

Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
bunnz12345
 
Iaetsd confidential multiparty computation with
Iaetsd confidential multiparty computation withIaetsd confidential multiparty computation with
Iaetsd confidential multiparty computation with
Iaetsd Iaetsd
 
2018 mar-09 - jens jenkins - finjan your claims to patent eligibility (update...
2018 mar-09 - jens jenkins - finjan your claims to patent eligibility (update...2018 mar-09 - jens jenkins - finjan your claims to patent eligibility (update...
2018 mar-09 - jens jenkins - finjan your claims to patent eligibility (update...
Workman Nydegger
 
Location Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data SecurityLocation Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data Security
Editor IJCATR
 
Sans signature buffer overflow blocker
Sans signature buffer overflow blockerSans signature buffer overflow blocker
Sans signature buffer overflow blocker
Alexander Decker
 
11.sans signature buffer overflow blocker
11.sans signature buffer overflow blocker11.sans signature buffer overflow blocker
11.sans signature buffer overflow blocker
Alexander Decker
 

Tendances (19)

Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Psdot 3 building and maintaining trust in internet voting with biometrics aut...
Psdot 3 building and maintaining trust in internet voting with biometrics aut...Psdot 3 building and maintaining trust in internet voting with biometrics aut...
Psdot 3 building and maintaining trust in internet voting with biometrics aut...
 
AIDA ICITET
AIDA ICITETAIDA ICITET
AIDA ICITET
 
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityWhitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
 
Data Leakage Detection and Security Using Cloud Computing
Data Leakage Detection and Security Using Cloud ComputingData Leakage Detection and Security Using Cloud Computing
Data Leakage Detection and Security Using Cloud Computing
 
Preserving location privacy in geo social applications
Preserving location privacy in geo social applications Preserving location privacy in geo social applications
Preserving location privacy in geo social applications
 
Iaetsd confidential multiparty computation with
Iaetsd confidential multiparty computation withIaetsd confidential multiparty computation with
Iaetsd confidential multiparty computation with
 
FUZZY FINGERPRINT METHOD FOR DETECTION OF SENSITIVE DATA EXPOSURE
FUZZY FINGERPRINT METHOD FOR DETECTION OF SENSITIVE DATA EXPOSUREFUZZY FINGERPRINT METHOD FOR DETECTION OF SENSITIVE DATA EXPOSURE
FUZZY FINGERPRINT METHOD FOR DETECTION OF SENSITIVE DATA EXPOSURE
 
IRJET- Analysis and Detection of E-Mail Phishing using Pyspark
IRJET- Analysis and Detection of E-Mail Phishing using PysparkIRJET- Analysis and Detection of E-Mail Phishing using Pyspark
IRJET- Analysis and Detection of E-Mail Phishing using Pyspark
 
2018 mar-09 - jens jenkins - finjan your claims to patent eligibility (update...
2018 mar-09 - jens jenkins - finjan your claims to patent eligibility (update...2018 mar-09 - jens jenkins - finjan your claims to patent eligibility (update...
2018 mar-09 - jens jenkins - finjan your claims to patent eligibility (update...
 
Biometric Databases and Hadoop__HadoopSummit2010
Biometric Databases and Hadoop__HadoopSummit2010Biometric Databases and Hadoop__HadoopSummit2010
Biometric Databases and Hadoop__HadoopSummit2010
 
IRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast EnvironmentIRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast Environment
 
Gs3612141219
Gs3612141219Gs3612141219
Gs3612141219
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Preserving location privacy in geo s...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Preserving location privacy in geo s...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Preserving location privacy in geo s...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Preserving location privacy in geo s...
 
Location Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data SecurityLocation Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data Security
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
 
Sans signature buffer overflow blocker
Sans signature buffer overflow blockerSans signature buffer overflow blocker
Sans signature buffer overflow blocker
 
11.sans signature buffer overflow blocker
11.sans signature buffer overflow blocker11.sans signature buffer overflow blocker
11.sans signature buffer overflow blocker
 
The Detection of Suspicious Email Based on Decision Tree ...
The Detection of Suspicious Email Based on Decision Tree                     ...The Detection of Suspicious Email Based on Decision Tree                     ...
The Detection of Suspicious Email Based on Decision Tree ...
 

Similaire à Psdot 13 robust data leakage and email filtering system

Jpdcs1 data leakage detection
Jpdcs1 data leakage detectionJpdcs1 data leakage detection
Jpdcs1 data leakage detection
Chaitanya Kn
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
Ajitkaur saini
 
83504808-Data-Leakage-Detection-1-Final.ppt
83504808-Data-Leakage-Detection-1-Final.ppt83504808-Data-Leakage-Detection-1-Final.ppt
83504808-Data-Leakage-Detection-1-Final.ppt
naresh2004s
 
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
Drog3
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
mistryritesh
 
Data leakage detection (synopsis)
Data leakage detection (synopsis)Data leakage detection (synopsis)
Data leakage detection (synopsis)
Mumbai Academisc
 
GTB - Protecting PII in the EU
GTB - Protecting PII in the EUGTB - Protecting PII in the EU
GTB - Protecting PII in the EU
VCW Security Ltd
 
Hacking databases
Hacking databasesHacking databases
Hacking databases
sunil kumar
 
Hacking databases
Hacking databasesHacking databases
Hacking databases
sunil kumar
 
Data leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdf
Data leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdfData leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdf
Data leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdf
naresh2004s
 
dataleakagedetection-1811210400vgjcd01.pptx
dataleakagedetection-1811210400vgjcd01.pptxdataleakagedetection-1811210400vgjcd01.pptx
dataleakagedetection-1811210400vgjcd01.pptx
naresh2004s
 

Similaire à Psdot 13 robust data leakage and email filtering system (20)

Jpdcs1 data leakage detection
Jpdcs1 data leakage detectionJpdcs1 data leakage detection
Jpdcs1 data leakage detection
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposure
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposure
 
83504808-Data-Leakage-Detection-1-Final.ppt
83504808-Data-Leakage-Detection-1-Final.ppt83504808-Data-Leakage-Detection-1-Final.ppt
83504808-Data-Leakage-Detection-1-Final.ppt
 
project 11
project 11project 11
project 11
 
Bh32379384
Bh32379384Bh32379384
Bh32379384
 
P2 Project
P2 ProjectP2 Project
P2 Project
 
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
 
Data leakage detection (synopsis)
Data leakage detection (synopsis)Data leakage detection (synopsis)
Data leakage detection (synopsis)
 
GTB - Protecting PII in the EU
GTB - Protecting PII in the EUGTB - Protecting PII in the EU
GTB - Protecting PII in the EU
 
JAVA 2013 IEEE NETWORKSECURITY PROJECT Utility privacy tradeoff in databases ...
JAVA 2013 IEEE NETWORKSECURITY PROJECT Utility privacy tradeoff in databases ...JAVA 2013 IEEE NETWORKSECURITY PROJECT Utility privacy tradeoff in databases ...
JAVA 2013 IEEE NETWORKSECURITY PROJECT Utility privacy tradeoff in databases ...
 
Utility privacy tradeoff in databases an information-theoretic approach
Utility privacy tradeoff in databases an information-theoretic approachUtility privacy tradeoff in databases an information-theoretic approach
Utility privacy tradeoff in databases an information-theoretic approach
 
Hacking databases
Hacking databasesHacking databases
Hacking databases
 
Hacking databases
Hacking databasesHacking databases
Hacking databases
 
Trust Based Packet Filtering.pptx
Trust Based Packet Filtering.pptxTrust Based Packet Filtering.pptx
Trust Based Packet Filtering.pptx
 
Data leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdf
Data leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdfData leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdf
Data leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdf
 
dataleakagedetection-1811210400vgjcd01.pptx
dataleakagedetection-1811210400vgjcd01.pptxdataleakagedetection-1811210400vgjcd01.pptx
dataleakagedetection-1811210400vgjcd01.pptx
 

Plus de ZTech Proje

Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
ZTech Proje
 
Psdot 11 highly secured net banking system using fingerprint recognition tech...
Psdot 11 highly secured net banking system using fingerprint recognition tech...Psdot 11 highly secured net banking system using fingerprint recognition tech...
Psdot 11 highly secured net banking system using fingerprint recognition tech...
ZTech Proje
 
Psdot 10 real time smart car lock security system using
Psdot 10 real time smart car lock security system usingPsdot 10 real time smart car lock security system using
Psdot 10 real time smart car lock security system using
ZTech Proje
 
Psdot 9 facial expression recognition in perceptual
Psdot 9 facial expression recognition in perceptualPsdot 9 facial expression recognition in perceptual
Psdot 9 facial expression recognition in perceptual
ZTech Proje
 

Plus de ZTech Proje (20)

separable reversible data hiding in encrypted image
separable reversible data hiding in encrypted imageseparable reversible data hiding in encrypted image
separable reversible data hiding in encrypted image
 
message passing interface
message passing interfacemessage passing interface
message passing interface
 
message passing interface
message passing interfacemessage passing interface
message passing interface
 
a famework for analyzing template security and privacy in biometric authenti...
 a famework for analyzing template security and privacy in biometric authenti... a famework for analyzing template security and privacy in biometric authenti...
a famework for analyzing template security and privacy in biometric authenti...
 
Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authentication
 
Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authentication
 
Psdot 18 performance analysis of cloud computing
Psdot 18 performance analysis of cloud computingPsdot 18 performance analysis of cloud computing
Psdot 18 performance analysis of cloud computing
 
Psdot 18 performance analysis of cloud computing
Psdot 18 performance analysis of cloud computingPsdot 18 performance analysis of cloud computing
Psdot 18 performance analysis of cloud computing
 
Psdot 17 new channel selection rule for jpeg steganography
Psdot 17 new channel selection rule for jpeg steganographyPsdot 17 new channel selection rule for jpeg steganography
Psdot 17 new channel selection rule for jpeg steganography
 
Psdot 16 a new framework for credit card transactions involving mutual authen...
Psdot 16 a new framework for credit card transactions involving mutual authen...Psdot 16 a new framework for credit card transactions involving mutual authen...
Psdot 16 a new framework for credit card transactions involving mutual authen...
 
Psdot 15 performance analysis of cloud computing
Psdot 15 performance analysis of cloud computingPsdot 15 performance analysis of cloud computing
Psdot 15 performance analysis of cloud computing
 
Psdot 14 using data mining techniques in heart
Psdot 14 using data mining techniques in heartPsdot 14 using data mining techniques in heart
Psdot 14 using data mining techniques in heart
 
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
 
Psdot 11 highly secured net banking system using fingerprint recognition tech...
Psdot 11 highly secured net banking system using fingerprint recognition tech...Psdot 11 highly secured net banking system using fingerprint recognition tech...
Psdot 11 highly secured net banking system using fingerprint recognition tech...
 
Psdot 10 real time smart car lock security system using
Psdot 10 real time smart car lock security system usingPsdot 10 real time smart car lock security system using
Psdot 10 real time smart car lock security system using
 
Psdot 9 facial expression recognition in perceptual
Psdot 9 facial expression recognition in perceptualPsdot 9 facial expression recognition in perceptual
Psdot 9 facial expression recognition in perceptual
 
Psdot 23 airport reasoning about time-dependent parking lot occupancy
Psdot 23 airport reasoning about time-dependent parking lot occupancyPsdot 23 airport reasoning about time-dependent parking lot occupancy
Psdot 23 airport reasoning about time-dependent parking lot occupancy
 
Psdot 8 a weak security notion for visual
Psdot 8 a weak security notion for visualPsdot 8 a weak security notion for visual
Psdot 8 a weak security notion for visual
 
Psdot 6 web based security analysis of opass authentication schemes using mob...
Psdot 6 web based security analysis of opass authentication schemes using mob...Psdot 6 web based security analysis of opass authentication schemes using mob...
Psdot 6 web based security analysis of opass authentication schemes using mob...
 
Psdot 4 scalable and secure sharing of personal health records in cloud compu...
Psdot 4 scalable and secure sharing of personal health records in cloud compu...Psdot 4 scalable and secure sharing of personal health records in cloud compu...
Psdot 4 scalable and secure sharing of personal health records in cloud compu...
 

Psdot 13 robust data leakage and email filtering system

  • 1. ROBUST DATA LEAKAGE AND EMAIL FILTERING SYSTEM OBJECTIVE: The main objective of this project is to identify the guilty agents who are leaking the sensitive information or data by using explicit data request and sample data request algorithm and also Email Filtering is done by using K-nearest neighbor algorithm. PROBLEM DIFINITION:  Data leakage detection is being handled by the technique of watermarking.  If the watermarking technique is used then the code which is embedded in the data can be modified because of which it becomes very difficult to identify the guilt agent or leaker.  Data Allocation Problem.  Data allocation depends on the request done by the agent and whether system can add fake object to it. ABSTRACT: Data leakage can be elaborated as in whena data distributor has given sensitive data to a set ofsupposedly trusted agents and some of the data isleaked and found in an unauthorized place. Anenterprise data leak is a scary proposition. Securitypractitioners have always had to deal with dataleakage issues that arise from various ways like email,1M and other Internet channels. In case ofdata
  • 2. leakage from trusted agents, the distributormust assess the likelihood that the leaked datacame from one or more agents. This can be doneby using a system which can identify those partieswho are guilty for such leakage even when data isaltered. For this the system can use data allocationstrategies or can also inject "realistic but fake" datarecords to improve identification of leakage.Moreover, data can also be leaked from withinan organization through e-mails. Hence, there isalso a need to filter these e-mails.This can be doneby blocking e-mails which contains images, videos orsensitive data for an organization. Principle used ine- mail filtering is we classify e-mail basedthe fingerprints of message bodies, the white andblack lists of email addresses and the words specificto spam. EXISTING SYSTEM: In Existing system, watermarking technique is used to identify the guilty agents who are leaking the sensitive information or data.  Watermarking is one of the old techniques which contain a unique code. This unique code is embedded in each copy which is then distributed to the clients by the user.  If any particularclient leaks the given data to the third parties i.e. unauthorized users, then this leaked data and the leaker can be identified by the means of this watermarking technique.
  • 3. DISADVANTAGES:  However, in some cases it is important not to alter the original distributor’s data. Traditionally, leakage detection is handled by watermarking, e.g., a unique code is embedded in each distributed copy.  If that copy is later discovered in the hands of an unauthorized party, the leaker can be identified.  Watermarks can be very useful in some cases, but again, involve some modification of the original data.  Watermarks can sometimes be destroyed if the data recipient is malicious. PROPOSED SYSTEM: Themain aim of the proposed system is to find out when andwho has leaked the sensitive data.In the proposed system; it is going to implement theconcept of "Fake Objects". Now if suppose the directorof the company wants to share some sensitive data(records) with clients of his company but he does notwant his data to be leaked anywhere in between. Sobefore sending the sensitive data to the clients what theproposed system will do is it will add fake objects(record) in database which will exactly look like originaldata. The Client will be unaware of these fake objects.Only the director of company knows that where andhow many fake objects are inserted.The system is going to use different modules for addingfake objects and for detecting fake objects.
  • 4. In worst case if agent modifies the database (deleted somerecords) and then leaks the data then also system willmake sure that fake object will be there to detect the guilty agent.Also implementation concept of email filtering modulein which if agent tries to e-mail the sensitive data thenfirst the request will go to the server and then it willcheck for fake objects in that data, and if that data issensitive data then that e-mail will automaticallydropped. Client will not be able to send the e-mail. ADVANTAGES:  If the distributor sees “enough evidence” that an agent leaked data, he may stop doing business with him, or may initiate legal proceedings.  In this project we develop a model for assessing the “guilt” of agents.  We also present algorithms for distributing objects to agents, in a way that improves our chances of identifying a leaker.  Finally, we also consider the option of adding “fake” objects to the distributed set. Such objects do not correspond to real entities but appear.  If it turns out an agent was given one or more fake objects that were leaked, then the distributor can be more confident that agent was guilty.  Agent will not be able to send sensitive data through e-mail.
  • 5. ALGORITHM USED: 1. Explicit Data Request 2. Sample Data Request 3. A-Priori Algorithm ARCHITECTURE DIAGRAM: Client 1 Client 2 Client 3 Client n E-Mail Data Leakage Detection Filtering System Module Non-sensitive Sensitive data data E-Mail Firewall E-Mail Sent Discarded Successfully Internet
  • 6. SYSTEM REQUIREMENTS: Hardware Requirements:  Intel Pentium iv  256/512 MB RAM  1 GB free disk space or greater  1 network interface card (NIC) Software Requirements:  MS Windows XP  MS IE Browser 6.0/later  MS Dot Net Framework 4.0  MS Visual Studio.NET 2010  Internet Information Server (IIS)  MS SQL Server 2005  Language :ASP.Net(C#.NET) APPLICATIONS: 1. Consultancy 2. Real Estate 3. Banks