INTERNATIONAL JOURNAL OF SCIENTIFIC DEVELOPMENT AND RESEARCH International Peer Reviewed & Refereed Journals, Open Access Journal ISSN Approved Journal No: 2455-2631 | Impact factor: 8.15 | ESTD Year: 2016
open access , Peer-reviewed, and Refereed Journals, Impact factor 8.15
Access Level Privacy Protection Data Contains Leak Protection
Authors Name:
Swati Bisen
, Kapesh Raghatate
Unique Id:
IJSDR1908054
Published In:
Volume 4 Issue 8, August-2019
Abstract:
Access control is a fundamental security technique in systems in which multiple users share access to common resources. It is the process of stating and enforcing security A approach in network security for misbehavior detection system present a method for detecting malicious misbehavior activity within networks. Along with the detection, it also blocks the malicious system within the network and adds it to Blacklist. Malicious node defined as a compromised machine within the network that performs the task provided by i.e. it does not forward the legitimate message to another node in the network or send some other message to a neighbor node. This scheme is used in graph analysis for community detection. To demonstrate Probabilistic Threat Propagation (PTP) considers the task of detecting malicious node in the network. Proposed System also shows the relationship between PTP and loopy belief propagation.
"Access Level Privacy Protection Data Contains Leak Protection ", International Journal of Science & Engineering Development Research (www.ijsdr.org), ISSN:2455-2631, Vol.4, Issue 8, page no.328 - 330, August-2019, Available :http://www.ijsdr.org/papers/IJSDR1908054.pdf
Downloads:
000337068
Publication Details:
Published Paper ID: IJSDR1908054
Registration ID:190949
Published In: Volume 4 Issue 8, August-2019
DOI (Digital Object Identifier):
Page No: 328 - 330
Publisher: IJSDR | www.ijsdr.org
ISSN Number: 2455-2631
Facebook Twitter Instagram LinkedIn