PTP in Network Security for Malicious Misbehavior Activity Detection

Authors

  • Tejaswini S. Akulwar Student, M.tech.(CSE),  R.C.E.R.T Chandrapur, India 
  • P. S. Kulkarni Department (I.T),  R.C.E.R.TChandrapur, India

DOI:

https://doi.org/10.53555/cse.v3i2.169

Keywords:

PTP, Malicious, Blacklist, Probabilistic,, legitimate.

Abstract

A PTP approach in network security for misbehavior detection system present a method for detecting malicious misbehavior activity within networks. Along with the detection, it also blocks the malicious system within the network and adds it to Blacklist. Malicious node defined as a compromised machine within the network that performs the task provided by i.e. it does not forward the legitimate message to another node in the network or sends some other message to a neighbor node. This system is based on Probabilistic threat propagation. This scheme is used in graph analysis for community detection. The proposed system enhances the prior community detection work by propagating threat probabilities across graph nodes. To demonstrate  Probabilistic Threat Propagation (PTP) considers the task of detecting malicious node in the network. Proposed System also shows the relationship between PTP and loopy belief ropagation. 

Downloads

Download data is not yet available.

References

Dr.Balachandra, D.N.Karthek,” An Overview on Security Issues in Cloud Computing”IOSR journal of Computer Engineering,Volume 3, Issue 1, 2012

Hamoud Alshammari and Christian Bach,”Administration Security Issues In Cloud Computing” International Journal of Information Technology Convergence and Services, Volume.3, No.3, August 2013

Manavi, Sadra Mohammadalian, Nur Izura Udzir, Azizol Abdullah,” Secure Model for Virtualization Layer in Cloud Infrastructure” International Journal of Cyber-Security and Digital Forensics.The Society of Digital Information and Wireless Communications, 2012

Mr. V.V.Prathap, Mrs.D.Saveetha,” Detecting Malware Intrusion in Network Environment” Mr. V.V.Prathap, International. Journal ofEngineering Research and Applications, Volume.

, Issue 3 ,Version 5, pp.75-80, March 2013 [5] Chung,Tianyi Xing,Dijiang Huang,” NICE: Network Intrusion Detectin and Countermeasure Selectionin Virtual Network Systems” IEEE Transaction on Dependable and Secure Computing, Volume. 10, No. 3, JULY/AUGUST 2013

Shina Sheen,R Rajesh,” Network Intrusion Detection using Feature Selection and Decision tree classifier” IEEE Region 10 Conference,200

Polat, K., & Gunes, S. (2007). An expert system approach based on principal component analysis and adaptive neuro-fuzzy inference system to diagnosis of diabetes disease. Digital Signal Processing, 17(4), 702–710.

Delen, D., Walker, G., & Kadam, A. (2005). Predicting breast cancer survivability: A comparison of three data mining methods. Artificial Intelligence in Medicine Artificial Intelligence in Medicine, 34(2), 113–127.

Kayaer, K., & Yildirim, T. (2003). Medical diagnosis on Pima Indian diabetes using general regression neural networks. In Proceedings of the international l conference on artificial neural networks and neural information processing (ICANN/ICONIP) (pp. 181–184).

Temurtas, F. (2009). A comparative study on thyroid disease diagnosis using neural networks. Expert Systems with Applications, 36, 944–949

Rumelhart, D. E., Hinton, G. E., & Williams, R. J. (1986). Learning internal representations by error propagation. In D. E. Rumelhart & J. L. McClelland (Eds.). Parallel distributed processing: Explorations in the microstructure of cognition (Vol. 1, pp. 318–362). Cambridge, MA: MIT Press.

Brent, R. P. (1991). Fast training algorithms for multi-layer neural nets. IEEE Transactions on Neural Networks, 2, 346–354

Gori, M., & Tesi, A. (1992). On the problem of local minima in backpropagation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 14, 76–85

Gulbag, A. (2006). Dagaalty work **. Ph.D. Thesis, Sakarya University, Institute of Science & Technology.

Gulbag, A., & Temurtas, F. (2006). A study on quantitative classification of binary gas mixture using neural networks and adaptive neuro fuzzy inference systems. Sensors and Actuators B, 115, 252–262

Hagan, M. T., & Menhaj, M. (1994). Training feed forward networks with the Marquardt algorithm. IEEE Transactions on Neural Networks, 5, 989–993.

Downloads

Published

2017-02-28

How to Cite

Akulwar, T. S., & Kulkarni, P. S. (2017). PTP in Network Security for Malicious Misbehavior Activity Detection. International Journal For Research In Advanced Computer Science And Engineering, 3(2), 01–06. https://doi.org/10.53555/cse.v3i2.169