International Business Machines Corporation
DATA LEAKAGE AND MISUSE DETECTION
Last updated:
Abstract:
A computer-implemented system and method for a data leakage and misuse detection system comprises receiving an evaluation dataset A, and building a signature of the evaluation dataset A (sig(A)), where A signature of a dataset is a multi-level evaluation data abstraction representation of the dataset. The method further comprises building a signature for each of existing datasets B (B1, B2, . . . , Bn) (sig(B.sub.x)) that are stored in a memory. The method then compares the sig(A) with each of the sig(B.sub.x)s. A similarity score is derived based on the comparing, and responsive to determining the similarity score exceeds a predefined threshold, the method comprises generating an activity related to the determination.
Utility
28 Oct 2020
28 Apr 2022