Contact Project Developer Ashish D. Tiwari [astiwz@gmail.com]
Download Synopsis Abstract
C#.NET ASP.NET Data Mining BE-Engineering(CO/IT) BCS MCS BCA MCA MCM BSC Computer/IT MSC Computer/IT Diploma (CO/IT) IEEE-2016 Security

Fast Detection of Transformed Data Leaks

The leak of sensitive data on computer systemsposes a serious threat to organizational security.
Abstract-Synopsis-Documentation

Abstract

The leak of sensitive data on computer systemsposes a serious threat to organizational security. Statistics showthat the lack of proper encryption on files and communicationsdue to human errors is one of the leading causes of data loss.Organizations need tools to identify the exposure of sensitivedata by screening the content in storage and transmission,i.e., to detect sensitive information being stored or transmittedin the clear. However, detecting the exposure of sensitiveinformation is challenging due to data transformation in thecontent. Transformations (such as insertion and deletion) resultin highly unpredictable leak patterns. In this paper, we utilizesequence alignment techniques for detecting complex data-leakpatterns. Our algorithm is designed for detecting long andinexact sensitive data patterns. This detection is paired with acomparable sampling algorithm, which allows one to comparethe similarity of two separately sampled sequences. Our systemachieves good detection accuracy in recognizing transformedleaks. We implement a parallelized version of our algorithms ingraphics processing unit that achieves high analysis throughput.We demonstrate the high multithreading scalability of our dataleak detection method required by a sizable organization


More..
Comment is Only Available for registered users! Create Account or Login Now!