Sciweavers

Share
COMSWARE
2006
IEEE

Utilizing network features for privacy violation detection

10 years 8 months ago
Utilizing network features for privacy violation detection
Privacy, its violations and techniques to circumvent privacy violation have grabbed the centre-stage of both academia and industry in recent months. Corporations worldwide have become conscious of the implications of privacy violation and its impact on them and to other stakeholders. Moreover, nations across the world are coming out with privacy protecting legislations to prevent data privacy violations. Such legislations however expose organizations to the issues of intentional or unintentional violation of privacy data. A violation by either malicious external hackers or by internal employees can expose the organizations to costly litigations. In this paper, we propose PRIVDAM; a data mining based intelligent architecture of a Privacy Violation Detection and Monitoring system whose purpose is to detect possible privacy violations and to prevent them in the future. This paper elaborates on the use of network characteristics for differentiating between normal network traffic and poten...
Jaijit Bhattacharya, Rajanish Dass, Vishal Kapoor,
Added 10 Jun 2010
Updated 10 Jun 2010
Type Conference
Year 2006
Where COMSWARE
Authors Jaijit Bhattacharya, Rajanish Dass, Vishal Kapoor, S. K. Gupta
Comments (0)
books