Data leak prevention on sensitive data using levenshtein distance algorithm

Page 1

International Research Journal of Engineering and Technology (IRJET) Volume: 04 Issue: 02 | Feb -2017

www.irjet.net

e-ISSN: 2395 -0056 p-ISSN: 2395-0072

DATA LEAK PREVENTION ON SENSITIVE DATA USING LEVENSHTEIN DISTANCE ALGORITHM R.Bhavani1 R.Jayashree2 S.Sushmitha3 Dr.T.Kalaichelvi 4 4Dr.T.Kalaichelvi,Professor,

Dept. of Computer Science & Engineering, Panimalar Institute Of Technology, Chennai,Tamilnadu, India

-------------------------------------------------------------------------****-----------------------------------------------------------------------------

and thus preventing the loss of confidential data from being leaked out of an industry.For example an organization poses details about their employees. It is essential to protect the data from leakage.In case when those sensitive data about the employee is intentionally transferred out by an employee; it can put the organization at risk when such sensitive information is disclosed to the public. So in practice, industries are struggling to provide right access to the information to the right people in organization. Data spillage is described as the impromptu or unplanned dispersal of private or delicate data to an unapproved component. Sensitive data in associations and affiliations consolidate intellectual property (IP), cash related information, understanding information, singular charge card data, and other information depending upon the business and the business. Data spillage speaks to a noteworthy issue for associations as the amount of scenes and the cost to those experiencing them continue expanding. Data spillage is enhanced by the way that transmitted data (both inbound and out-bound), including messages, messaging, site structures, and record trades among others, are for the most part unregulated and unmonitored on their way to their objectives. The potential harm and unfriendly results of an information spillage occurrence can be characterized into two classes: Direct and Indirect Losses. Coordinate misfortunes allude to unmistakable harm that is anything but difficult to gauge or to appraise quantitatively. Aberrant misfortunes, then again, are considerably harder to measure and have a substantially more extensive effect regarding cost, place, and time. Coordinate misfortunes incorporate infringement of controls, (for example, those securing client protection) bringing about fines, settlements or

ABSTRACT---Statistics from security firms, investigate establishments and government associations demonstrate that the quantity of information whole examples has developed quickly lately. Among different information release cases, human missteps are one of the fundamental drivers of information misfortune. According to a report from Risk Based Security (RBS) the amount of discharged delicate data records has extended altogether in the midst of the latest couple of years, i.e., from 412 million in 2012 to 822 million in 2013. Purposefully orchestrated strikes, unexpected breaks (sending mystery messages to unclassified email records) and human oversights (selecting the wrong advantage) incite to most by far of the data spill scenes. Recognizing and preventing data spills requires a game plan of complementary courses of action, which may consolidate data spill disclosure data containment stealthy malware area and approach approval. Organize information spill location (DLD) typically performs profound bundle examination (DPI) and outputs for any occasions of fragile data outlines. In this paper, a data spill area course of action which can be outsourced from affiliation, layout and execute Lucene web look instrument structure Levenshtein-expel strategy to avoid data spill and moreover give security sparing to delicate data. Keywords: Risk based security, data leak detection, deep packet inspection, Levenshtein-distance, DLD, DPI, data spill

1. INTRODUCTION Organization in every industry meets with loss of sensitive data. These data is transferred intentionally or an intentionally by the employees within the organization. Example, leakage of government, financial data, baking records, and many more. Such loss of internal data damages industry standards, brand and reputations. As these data are more valuable one it is necessary to protect from loss in public and data loss detection tools should be designed to avoid such data leakage 2017, IRJET

|

Impact Factor value: 5.181

|

ISO 9001:2008 Certified Journal

| Page 2026


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.