Cart (Loading....) | Create Account
Close category search window
 

Robust data leakage and email filtering system

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Agarwal, A. ; Dept. of Inf. Technol., Univ. of Pune, Pune, India ; Gaikwad, M. ; Garg, K. ; Inamdar, V.

Data leakage can be elaborated as in when a data distributor has given sensitive data to a set of supposedly trusted agents and some of the data is leaked and found in an unauthorized place. An enterprise data leak is a scary proposition. Security practitioners have always had to deal with data leakage issues that arise from various ways like e-mail, IM and other Internet channels. In case of data leakage from trusted agents, the distributor must assess the likelihood that the leaked data came from one or more agents. This can be done by using a system which can identify those parties who are guilty for such leakage even when data is altered. For this the system can use data allocation strategies or can also inject “realistic but fake” data records to improve identification of leakage. Moreover, data can also be leaked from within an organization through e-mails. Hence, there is also a need to filter these e-mails. This can be done by blocking e-mails which contains images, videos or sensitive data for an organization. Principle used in e-mail filtering is we classify e-mail based the fingerprints of message bodies, the white and black lists of email addresses and the words specific to spam.

Published in:

Computing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on

Date of Conference:

21-22 March 2012

Need Help?


IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.