Professional Documents
Culture Documents
Submitted by: Name Aravind P Nandini A Prajit Dhar USN 1AT08IS009 1AT08IS049 1AT08IS060 Mobile number 9449034525 8971844225 9731099006 Email-id aravind.p27@gmail.com nandini.padmavathi@gmail.com prajitdhar@gmail.com
Table of Contents
1 Introduction .............................................................................................4
1.1 Purpose .......................................................................................................................4 1.2 Scope ..........................................................................................................................4 1.3 Definitions, Acronyms and Abbreviations ................................................................4 1.4 References ..................................................................................................................5
3. Requirement Specifications .8
3.1 Reliability . .8 3.2 Software System Attributes. ...8
3.2.1 Reliability ................................................................................................................................. 8 3.2.2 Availability .............................................................................................................................. 8 3.2.3 Security ..................................................................................................................................... 8 3.2.4 Maintainability .......................................................................................................................... 9 3.2.5 Portability ................................................................................................................................. 9
Table of Figures
Figure 1 Control Flow Diagram ..................................................................... 5 Figure 2 Data Flow Diagram .......................................................................... 7
1. Introduction
In the course of doing business, sometimes sensitive data must be handed over to supposedly trusted third parties. We call the owner of the data as distributors and the third parties as agents. Our goal is to detect when the distributors sensitive data has been leaked by agents and also to identify the agent who leaked that data.
1.1 Purpose
A Software Requirement Specification (SRS) is a complete set concise description of the entire external interface of the system with its environment including other software, communication ports, hardware, and human users. Software Requirements Specification (SRS) documents key specifications, functional and nonfunctional requirements of Data Leakage Detection. We develop a model for accessing the guilty of agents and present algorithms for distributing object to agent in the way that improves our chance of identifying a data leaker.
1.2 Scope
We create an System to implement Data Leakage Detection. This System is related to the domains of Data Mining and Information Security. The System will detect the guilty agents without changing the existing data. Our System does not deal with the concept of data leakage prevention. Our goal is to detect when the distributors sensitive data have been leaked by agents, and if possible to identify the agent that leaked the data. Benefits Our System gives privileged access to the Administrator and the Distributors, but not to the agents. If any agent if caught leaking data, his/her account will be locked, thus preventing future data leaks.
1.4 References
P. Papadimitriou and H. Garcia-Molina, Data leakage detection, Stanford University, Tech. Rep., 2008. P. Papadimitriou and H. Garcia-Molina, Data Leakage Detection, Technical report, Stanford Univ., 2008. Papadimitriou P, Garcia-Molina H. A Model For Data Leakage Detection// IEEE Transaction on Knowledge And Data Engineering Jan.2011.
Distributor
1 6
Agent
Target
Figure 1 Control Flow Diagram
1. 2. 3. 4. 5. 6. 7. 8.
Agent requests for the data from distributor. Distributor searches the data in the data warehouse. Inserts Fake object to the data. Sends the data to the agent. Agent Login to the account. If the distributor finds the data in unauthorized place. Find the guilty agent who leaked the data by guilty agent analysis. If the agent is found that leaking data his/her account password will be changed by admin. 9. Agent is restricted to accesses account.
Data set
Optimization
Data Distributor
2.1.1 Hardware Interfaces The system has no hardware interface requirements. 2.1.2 Software Interfaces The following software and interfaces are used Name: Mnemonic used: Version number: Source: Name: Mnemonic used: Version number: Source: Microsoft Visual Studio 2010 VS 2010 10.0.40219.1 http://www.microsoft.com/visualstudio/en-us Microsoft SQL Server 2008 MSQL 10.50.2500.0 http://www.microsoft.com/sqlserver 7
3. Requirement Specifications
3.1 Performance Requirements
The system supports any no transaction of data from distributor to agent. Amount and type of data to be sends depends on the agent request. There can be only one terminal opened at a time.
3.2.4 Maintainability Our System consists of 4 Major modules. Each of these modules can be subjected to unit testing, to evaluate their maintainability. 3.2.5 Portability Our system is implemented using the Language C#, which is highly portable as it runs on the .NET framework. .NET includes a virtual execution System called Common Language Runtime (CLR), an international standard that is the basis for creating and development environments in which several languages and libraries work together seamlessly. Since most of the soft wares which we use are created by Microsoft, it is completely portable on any Windows OS (XP or higher).