Abstract:
Users can detect data leaks and find their sources with data leakage detection methods. We often find leaked data in illegal places. We may locate critical data on an unauthorized laptop or website. Identifying the data leaker becomes crucial.
We offer an enhanced data leakage detection technique that uses data allocation between agents to trace back unauthorized leaking sources. Users can transfer data to other users by treating receivers as agents who receive data with undetected id changes.
After finding leaked data on illegal sources, these changes allow our system to track its origins. This system stores data by agent to identify data leaks. Our technology detects.txt,.jpg, and.bmp data.
Note: Please discuss with our team before submitting this abstract to the college. This Abstract or Synopsis varies based on student project requirements.
Did you like this final year project?
To download this project Code with thesis report and project training... Click Here