Abstract
The avoidance of leaking of facts has been identified as a system that detects sensitive statistics, records the stats in an effective manner in which it travels around in a business organization of any unwanted disclosure of statistics. As personal information is capable of remaining on quite a variety of computer gadgets and crossing through countless networks, the right of entry to factor is granted for social networks. Email leakage has been defined as though the email goes either intentionally or unintentionally to an address to which it can no longer be sent. The strategy or product that seeks to minimize risks to statistical leakage is data outflow protection. In this article, the clustering approach would be blended with the time span frequency. To determine the relevant centroids for evaluating the variety of emails that are exchanged between organizations participants. Each participant would lead to a variety of topic clusters, and innumerable contributors in the company who have not spoken with each other previously will even be included in one such subject cluster. Every addressee would be classified as a feasible leak receiver and one that is legal at the time of composition of a new electronic mail. Once, this grouping was grounded solely on the electronic mail received between the source and the recipient and also on its subject clusters area. In this context K-means clustering concept, clustering of Tabu K-means and the FPCM algorithm were considered to perceive the most successful clustering points. In the research observations, it was verified that for known and unknown addressees, the suggested solution achieves greater TPR. This reduces the FPR for well-known and unidentified receivers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Shvartzshnaider, Y., et al.: VACCINE: using contextual integrity for data leakage detection. In: The World Wide Web Conference, pp. 1702–1712. ACM, May 2019
Pu, Y., Shi, J., Chen, X., Guo, L., Liu, T.: Towards misdirected email detection based on multi- attributes. In: 2015 IEEE Symposium on Computers and Communication (ISCC), pp. 796–802. IEEE, July 2015
Shetty, J., Adibi, J.: The Enron email dataset database schema and brief statistical report. Inf. Sci. Inst. Techn. Rep. Univ. South. Calif. 4(1), 120–128 (2004)
Tu, Q., Lu, J.F., Yuan, B., Tang, J.B., Yang, J.Y.: Density-based hierarchical clustering for streaming data. Pattern Recognit. Lett. 33(5), 641–645 (2012)
Yadav, N., Kobren, A., Monath, N., McCallum, A.: Supervised hierarchical clustering with exponential linkage. arXiv preprint arXiv:1906.07859 (2019)
Dang, N.C., De la Prieta, F., Corchado, J.M., Moreno, M.N.: Framework for retrieving relevant contents related to fashion from online social network data. In: de la Prieta, F., et al. (eds.) PAAMS 2016. AISC, vol. 473, pp. 335–347. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-40159-1_28
Raman, P., Kayacık, H.G., Somayaji, A.: Understanding data leak prevention. In: 6th Annual Symposium on Information Assurance (ASIA 2011), p. 27, June 2011
Yu, X., Tian, Z., Qiu, J., Jiang, F.: A data leakage prevention method based on the reduction of confidential and context terms for smart mobile devices. Wirel. Commun. Mob. Comput. 2018 (2018)
Yaghini, M., Ghazanfari, N.: Tabu-KM: a hybrid clustering algorithm based on Tabu search approach (2010)
Alsayat, A., El-Sayed, H.: Social media analysis using optimized K-means clustering. In: 2016 IEEE 14th International Conference on Software Engineering Research, Management and Applications (SERA), pp. 61–66. IEEE, June 2016
Zilberman, P., Dolev, S., Katz, G., Elovici, Y., Shabtai, A.: Analyzing group communication for preventing data leakage via email. In: Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, pp. 37–41. IEEE, July 2011
Carvalho, V.R., Cohen, W.W.: Preventing information leaks in email. In: Proceedings of the 2007 SIAM International Conference on Data Mining, pp. 68–77. Society for Industrial and Applied Mathematics, April 2007
Kalyan, C., Chandrasekaran, K.: Information leak detection in financial e-mails using mail pattern analysis under partial information. In: AIC 2007: Proceedings of the 7th Conference on 7th WSEAS International Conference on Applied Informatics and Communications, pp. 104–109, August 2007
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Balakrishnan, S.G., Ramya, P., Divyapriya, P. (2023). Hybrid Adaptive Method for Intrusion Detection with Enhanced Feature Elimination in Ensemble Learning. In: Abraham, A., Pllana, S., Casalino, G., Ma, K., Bajaj, A. (eds) Intelligent Systems Design and Applications. ISDA 2022. Lecture Notes in Networks and Systems, vol 716. Springer, Cham. https://doi.org/10.1007/978-3-031-35501-1_27
Download citation
DOI: https://doi.org/10.1007/978-3-031-35501-1_27
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-35500-4
Online ISBN: 978-3-031-35501-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)