source code for data leakage detection in asp net
#1

Hello studentbank.in
I have a project on data leakage detection and I am using vb.net for it's implementation (front end: vb.net. back end: ms sql) can you help me with the complete source code? I have searched online for tutorials but nothing I could find.
Reply
#2

A data distributor has given confidential data to a set of allegedly trusted agents (third parties). Some of the data is filtered and found in an unauthorized place (for example, on the web or someone's laptop). The distributor must evaluate the probability that the filtered data comes from one or more agents, rather than having been obtained independently by other means. We propose data allocation strategies (through agents) that improve the probability of identifying leaks. These methods are not based on alterations of the released data (for example, watermarks). In some cases we can also inject "realistic but false" data records to further improve our chances of detecting leaks and identifying the culprit.


Data leakage is the big challenge facing industries and different institutes. Although there are a number of systems designed for data security by using different encryption algorithms, there is a big problem of the integrity of the users of those systems. It is very difficult for any system administrator to locate the flow of data between users of the system. It creates many ethical problems in the office work environment.

Traditionally, leak detection is handled by watermarks, for example, a unique code is embedded in each distributed copy. If that copy is later discovered by an unauthorized party, the loss can be identified. Watermarks can be very useful in some cases, but again, they involve a modification of the original data. In addition, watermarks can sometimes be destroyed if the recipient of the data is malicious. E.g. A hospital can give patient records to researchers who will design new treatments. Similarly, a company may have partnerships with other companies that require the sharing of customer data. Another company can outsource its data processing, so the data must be given to several other companies. We call the data owner to the distributor and the allegedly trusted third parties.

In the virtual and widely distributed network, the process of transferring confidential data from the distributor to trusted third parties always occurs regularly in this modern world. It needs to safeguard the security and durability of the service based on the demand of the users. The idea of modifying one's own data to detect leakage is not a new approach. In general, sensitive data are filtered by agents, and the specific agent is responsible for the filtered data should always be detected at an early stage.

Therefore, the detection of data from the distributor to agents is mandatory. This project presents a data leak detection system that uses different allocation strategies and which evaluates the probability that the filtered data comes from one or more agents. For secure transactions, allowing only authorized users to access sensitive data through access control policies will prevent data leakage by sharing information only with trusted parties and also data must be leaked by adding False records in the data set and that improves Probability of identifying system leaks
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: vormetric data security asp ppt, data leakage detection abstract in dot net, ieee based asp net projects data leakage detection project pdf, download data leakage project in c net, source code intrusion detection system asp net, source code for data leakage detection in java, download the data leakage project source code in asp net,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  voice vased email system source code 0 3,139 20-04-2021, 07:59 AM
Last Post:
  Earthquake detection alert alarm for people security ppt 0 886 06-01-2019, 09:29 AM
Last Post:
  Earthquake detection alert alarm for people security 0 805 06-01-2019, 09:25 AM
Last Post:
  site net real estate guest post 2 3,383 14-11-2018, 07:10 PM
Last Post:
  er diagram for credit card fraud detection images 0 7,718 04-11-2018, 06:13 PM
Last Post: Guest
  ns2 source codes free download for hello flood attack 0 2,845 31-10-2018, 02:42 PM
Last Post: Guest
  voice based email for blinds source code 0 722 22-10-2018, 05:12 PM
Last Post: Guest
  source code for blood group detection in matlab 0 6,606 22-10-2018, 10:59 AM
Last Post: Guest
  voice based email for blinds source code 0 708 21-10-2018, 07:58 PM
Last Post: Guest
  voice based email for blinds source code 0 642 21-10-2018, 07:43 PM
Last Post: Guest

Forum Jump: