International Business Machines Corporation
DATA LEAKAGE AND MISUSE DETECTION

Last updated:

Abstract:

A computer-implemented system and method for a data leakage and misuse detection system comprises receiving an evaluation dataset A, and building a signature of the evaluation dataset A (sig(A)), where A signature of a dataset is a multi-level evaluation data abstraction representation of the dataset. The method further comprises building a signature for each of existing datasets B (B1, B2, . . . , Bn) (sig(B.sub.x)) that are stored in a memory. The method then compares the sig(A) with each of the sig(B.sub.x)s. A similarity score is derived based on the comparing, and responsive to determining the similarity score exceeds a predefined threshold, the method comprises generating an activity related to the determination.

Status:
Application
Type:

Utility

Filling date:

28 Oct 2020

Issue date:

28 Apr 2022