Abstract
A data breach is the intentional or inadvertent exposure of confidential information to unauthorized users. In the digital world, data has become most important thing in enterprise. Data leaks provide serious threat to organizations, financial, and reputation of the company. As the data growing exponentially and data breaches are also increasing, detecting, and preventing data leaks become most one of the security concerns for company. Here we use the IP address to identify the users and hackers and administrator looks for the users IP address and block Hackers IP address so that data leakage is not possible from a third party. Hackers try to acquire information through SQL injection and our paper suggests a way to prevent it. This paper helps to detect and prevent the data breach while sharing the data with the consumer and improve the probability of preventing the unauthorized users while sharing the data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Desmet, L., Peissen, F., Joosen, W., Verbaeten, P.: Bridging the gap between web application firewalls and web applications. In: Proceedings of the fourth ACM workshop on formal methods in Security, pp. 67–77, Nov 2006
Choudhary, P.B., Waghmare, S., Patil, N.: Data transmission using AES-RSA based hybrid security algorithms. Int. J. Recent Innov. Trends Comput. Commun. (2015)
Xiang, S., He, J.: Database authentication watermarking scheme in encrypted domain (2017)
http://investors.imperva.com/phoenix.zhtml?c=247116&p=irol-newsArticle&ID=1596618
Ramamani, S., Balaguru Shankar, G., Sakthi Vignesh, K., Santhosh Kumar, G., Siva Surya, D.: Data leakage detection (2015)
Huang, X., Lu, Y., Li, D., Ma, M.: A novel mechanism for fast detection of transformed data leakage (2018)
https://searchfinancialsecurity.techtarget.com/tip/Data-leakage-detection-and-prevention
https://www.mimecast.com/de/content/dataleakage-prevention-solutions/
Gendron, M.: Imperva introduces first network adaptive web application firewall (2006)
Jaya Mabel Rani, A., Pravin, A.: Multi-objective hybrid fuzzified PSO and fuzzy C-means algorithm for clustering CDR data. In: International Conference on Communication and Signal Processing, April 4–6, 2019, pp. 94–98. IEEE
Heiderich, M., Nava, E., Heyes, G., Lindsay, D.: Webapplication_obfuscation. Elsevier (2011). Accessed from https://doc.lagout.org/security/Web%20Application%20Obfuscation/Web%20Application%20Obfuscation.pdf
https://www.academia.edu/28193212/Data_Transmission_using_AESRSA_Based_Hybrid_Security_Algorithms
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Jaya Mabel Rani, A., Vishnu Priya, G., Velmurugan, L., Vamsi Krishnan, V. (2020). Data Leakage Prevention and Detection Techniques Using Internet Protocol Address. In: Bhateja, V., Satapathy, S., Zhang, YD., Aradhya, V. (eds) Intelligent Computing and Communication. ICICC 2019. Advances in Intelligent Systems and Computing, vol 1034. Springer, Singapore. https://doi.org/10.1007/978-981-15-1084-7_64
Download citation
DOI: https://doi.org/10.1007/978-981-15-1084-7_64
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-1083-0
Online ISBN: 978-981-15-1084-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)