Presentation is loading. Please wait.

Presentation is loading. Please wait.

Academic Advisor: Dr. Yuval Elovici Technical Advisor: Polina Zilberman Team Members: Dmitry Kaganov Rostislav Pinski Eli Shtein Alexander Gorohovski.

Similar presentations


Presentation on theme: "Academic Advisor: Dr. Yuval Elovici Technical Advisor: Polina Zilberman Team Members: Dmitry Kaganov Rostislav Pinski Eli Shtein Alexander Gorohovski."— Presentation transcript:

1

2 Academic Advisor: Dr. Yuval Elovici Technical Advisor: Polina Zilberman Team Members: Dmitry Kaganov Rostislav Pinski Eli Shtein Alexander Gorohovski Web site: http://www.cs.bgu.ac.il/~grorhovs/project/Main

3 Simple User Send an e-mail Check e- mail validity Add new user Set systems’ configurations Log in to the system as a system administrator Remove existing user Administrator E-mail client Exchange server > Simple User > Administrator Update existing user Deal with e- mails marked by a question mark Log out from the administrator mode Mark e-mail as got / sent by mistake Use Cases Diagram Update system’s model

4 User Outlook Plug-in Server Exchange server Middle-ware Host System core Figure 1.1 – System architecture Global Architecture

5 Same computer Plug-in Middle-ware Server Data base Management Console Log files System Core Figure 1.2 – System Core architecture System Architecture

6 Data Flow Diagram

7 E-mail to classify, e.g. query Link's threshold Similarity score  Every two users that exchanged emails in the past define a link, and all emails exchanged between these two users are associated with the link.  The classification of an e- mail with content c sent from s to r is performed as follows: the e-mail is compared with the link defined by the users s and r. If the received similarity score is lower than the link's threshold similarity score, then sending the e-mail is considered a potential leak. Purposed Solution – The Theoretical Model Purposed Solution – The Theoretical Model Link communication analysis

8 Orange circles represent the emails taken into account when classifying an email sent from Bob to Alice.  Assume Alice and Bob belong to a group that communicates topic T, and Bob sends an email with content T to Alice. Alice won't be considered a wrong recipient, even if Alice and Bob have never exchanged communication with content T before. Group communication analysis

9 Yes No  Apparently, cascading the group-based and link-based classifiers will take advantage of the “strong” points of both classifiers, and eliminate their “weak” points. Cascading the models

10 Overview of User Interface Simple User Interface

11 Overview of User Interface Administrator Interface

12 Plug-In – Main Classes

13 “Middle Ware” – Main Classes

14 Model + Server – Main Classes

15 – Main Classes Management Console– Main Classes

16 Data Base Information

17

18


Download ppt "Academic Advisor: Dr. Yuval Elovici Technical Advisor: Polina Zilberman Team Members: Dmitry Kaganov Rostislav Pinski Eli Shtein Alexander Gorohovski."

Similar presentations


Ads by Google