PTP in Network Security for Malicious Misbehavior Activity Detection
DOI:
https://doi.org/10.53555/cse.v3i2.169Keywords:
PTP, Malicious, Blacklist, Probabilistic,, legitimate.Abstract
A PTP approach in network security for misbehavior detection system present a method for detecting malicious misbehavior activity within networks. Along with the detection, it also blocks the malicious system within the network and adds it to Blacklist. Malicious node defined as a compromised machine within the network that performs the task provided by i.e. it does not forward the legitimate message to another node in the network or sends some other message to a neighbor node. This system is based on Probabilistic threat propagation. This scheme is used in graph analysis for community detection. The proposed system enhances the prior community detection work by propagating threat probabilities across graph nodes. To demonstrate Probabilistic Threat Propagation (PTP) considers the task of detecting malicious node in the network. Proposed System also shows the relationship between PTP and loopy belief ropagation.
Downloads
References
Dr.Balachandra, D.N.Karthek,” An Overview on Security Issues in Cloud Computing”IOSR journal of Computer Engineering,Volume 3, Issue 1, 2012
Hamoud Alshammari and Christian Bach,”Administration Security Issues In Cloud Computing” International Journal of Information Technology Convergence and Services, Volume.3, No.3, August 2013
Manavi, Sadra Mohammadalian, Nur Izura Udzir, Azizol Abdullah,” Secure Model for Virtualization Layer in Cloud Infrastructure” International Journal of Cyber-Security and Digital Forensics.The Society of Digital Information and Wireless Communications, 2012
Mr. V.V.Prathap, Mrs.D.Saveetha,” Detecting Malware Intrusion in Network Environment” Mr. V.V.Prathap, International. Journal ofEngineering Research and Applications, Volume.
, Issue 3 ,Version 5, pp.75-80, March 2013 [5] Chung,Tianyi Xing,Dijiang Huang,” NICE: Network Intrusion Detectin and Countermeasure Selectionin Virtual Network Systems” IEEE Transaction on Dependable and Secure Computing, Volume. 10, No. 3, JULY/AUGUST 2013
Shina Sheen,R Rajesh,” Network Intrusion Detection using Feature Selection and Decision tree classifier” IEEE Region 10 Conference,200
Polat, K., & Gunes, S. (2007). An expert system approach based on principal component analysis and adaptive neuro-fuzzy inference system to diagnosis of diabetes disease. Digital Signal Processing, 17(4), 702–710.
Delen, D., Walker, G., & Kadam, A. (2005). Predicting breast cancer survivability: A comparison of three data mining methods. Artificial Intelligence in Medicine Artificial Intelligence in Medicine, 34(2), 113–127.
Kayaer, K., & Yildirim, T. (2003). Medical diagnosis on Pima Indian diabetes using general regression neural networks. In Proceedings of the international l conference on artificial neural networks and neural information processing (ICANN/ICONIP) (pp. 181–184).
Temurtas, F. (2009). A comparative study on thyroid disease diagnosis using neural networks. Expert Systems with Applications, 36, 944–949
Rumelhart, D. E., Hinton, G. E., & Williams, R. J. (1986). Learning internal representations by error propagation. In D. E. Rumelhart & J. L. McClelland (Eds.). Parallel distributed processing: Explorations in the microstructure of cognition (Vol. 1, pp. 318–362). Cambridge, MA: MIT Press.
Brent, R. P. (1991). Fast training algorithms for multi-layer neural nets. IEEE Transactions on Neural Networks, 2, 346–354
Gori, M., & Tesi, A. (1992). On the problem of local minima in backpropagation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 14, 76–85
Gulbag, A. (2006). Dagaalty work **. Ph.D. Thesis, Sakarya University, Institute of Science & Technology.
Gulbag, A., & Temurtas, F. (2006). A study on quantitative classification of binary gas mixture using neural networks and adaptive neuro fuzzy inference systems. Sensors and Actuators B, 115, 252–262
Hagan, M. T., & Menhaj, M. (1994). Training feed forward networks with the Marquardt algorithm. IEEE Transactions on Neural Networks, 5, 989–993.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2017 gnpublication@
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
In consideration of the journal, Green Publication taking action in reviewing and editing our manuscript, the authors undersigned hereby transfer, assign, or otherwise convey all copyright ownership to the Editorial Office of the Green Publication in the event that such work is published in the journal. Such conveyance covers any product that may derive from the published journal, whether print or electronic. Green Publication shall have the right to register copyright to the Article in its name as claimant, whether separately
or as part of the journal issue or other medium in which the Article is included.
By signing this Agreement, the author(s), and in the case of a Work Made For Hire, the employer, jointly and severally represent and warrant that the Article is original with the author(s) and does not infringe any copyright or violate any other right of any third parties, and that the Article has not been published elsewhere, and is not being considered for publication elsewhere in any form, except as provided herein. Each author’s signature should appear below. The signing author(s) (and, in