Skip to main content

Data Leakage Prevention and Detection Techniques Using Internet Protocol Address

  • Conference paper
  • First Online:
Intelligent Computing and Communication (ICICC 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1034))

Included in the following conference series:

Abstract

A data breach is the intentional or inadvertent exposure of confidential information to unauthorized users. In the digital world, data has become most important thing in enterprise. Data leaks provide serious threat to organizations, financial, and reputation of the company. As the data growing exponentially and data breaches are also increasing, detecting, and preventing data leaks become most one of the security concerns for company. Here we use the IP address to identify the users and hackers and administrator looks for the users IP address and block Hackers IP address so that data leakage is not possible from a third party. Hackers try to acquire information through SQL injection and our paper suggests a way to prevent it. This paper helps to detect and prevent the data breach while sharing the data with the consumer and improve the probability of preventing the unauthorized users while sharing the data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Desmet, L., Peissen, F., Joosen, W., Verbaeten, P.: Bridging the gap between web application firewalls and web applications. In: Proceedings of the fourth ACM workshop on formal methods in Security, pp. 67–77, Nov 2006

    Google Scholar 

  2. Choudhary, P.B., Waghmare, S., Patil, N.: Data transmission using AES-RSA based hybrid security algorithms. Int. J. Recent Innov. Trends Comput. Commun. (2015)

    Google Scholar 

  3. Xiang, S., He, J.: Database authentication watermarking scheme in encrypted domain (2017)

    Google Scholar 

  4. http://investors.imperva.com/phoenix.zhtml?c=247116&p=irol-newsArticle&ID=1596618

  5. Ramamani, S., Balaguru Shankar, G., Sakthi Vignesh, K., Santhosh Kumar, G., Siva Surya, D.: Data leakage detection (2015)

    Google Scholar 

  6. Huang, X., Lu, Y., Li, D., Ma, M.: A novel mechanism for fast detection of transformed data leakage (2018)

    Article  Google Scholar 

  7. https://searchfinancialsecurity.techtarget.com/tip/Data-leakage-detection-and-prevention

  8. https://www.mimecast.com/de/content/dataleakage-prevention-solutions/

  9. https://www.cyberoam.com/dataleakageprevention.html

  10. Gendron, M.: Imperva introduces first network adaptive web application firewall (2006)

    Google Scholar 

  11. Jaya Mabel Rani, A., Pravin, A.: Multi-objective hybrid fuzzified PSO and fuzzy C-means algorithm for clustering CDR data. In: International Conference on Communication and Signal Processing, April 4–6, 2019, pp. 94–98. IEEE

    Google Scholar 

  12. Heiderich, M., Nava, E., Heyes, G., Lindsay, D.: Webapplication_obfuscation. Elsevier (2011). Accessed from https://doc.lagout.org/security/Web%20Application%20Obfuscation/Web%20Application%20Obfuscation.pdf

  13. https://www.academia.edu/28193212/Data_Transmission_using_AESRSA_Based_Hybrid_Security_Algorithms

  14. https://www.researchgate.net/publication/281165846_Data_Transmission_using_AESRSA_Based_Hybrid_Security_Algorithms

  15. https://digitalguardian.com/dskb/data-loss-prevention

  16. https://www.google.com/search?q=data+leakage+prevention+solution&source=lnms&tbm=isch&sa=X&ved=0ahUKEwiBpMfXgbzhAhWC8XMBHTQSDUAQ_AUIDygC&biw=1536&bih=754

  17. https://www.surveilstar.com/prevent-data-leakage.html

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. Jaya Mabel Rani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jaya Mabel Rani, A., Vishnu Priya, G., Velmurugan, L., Vamsi Krishnan, V. (2020). Data Leakage Prevention and Detection Techniques Using Internet Protocol Address. In: Bhateja, V., Satapathy, S., Zhang, YD., Aradhya, V. (eds) Intelligent Computing and Communication. ICICC 2019. Advances in Intelligent Systems and Computing, vol 1034. Springer, Singapore. https://doi.org/10.1007/978-981-15-1084-7_64

Download citation

Publish with us

Policies and ethics