This document discusses a data leakage detection system. It begins with an abstract discussing how data leakage detection systems can securely prevent data leakage. It then discusses how a main server passes data to client servers, and how the main server records IP and MAC addresses to detect if data leakage occurs from a particular client, identifying that client as the "guilt agent". The introduction provides more details on the motivation for detecting data leakage when sensitive data is shared with third parties. It discusses how perturbation techniques can modify data but may not always be suitable. It then describes how the proposed system uses unobtrusive techniques to detect leakage by analyzing which agents are more likely to be responsible for leaked data being discovered, without modifying the original data. The document