Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

“Malicious Misbehavior Activity Detection Using Probabilistic Threat Propagation in Network Security”

Author : Tejaswini S. Akulwar 1 Associate Prof. P. S. Kulkarni 2

Date of Publication :10th August 2017

Abstract: A PTP approach in network security for misbehavior detection system present a method for detecting malicious misbehavior activity within networks. Along with the detection, it also blocks the malicious system within the network and adds it to Blacklist. Malicious node defined as a compromised machine within the network that performs the task provided by i.e. it does not forward the legitimate message to another node in the network or sends some other message to a neighbor node. This system is based on Probabilistic threat propagation. This scheme is used in graph analysis for community detection. The proposed system enhances the prior community detection work by propagating threat probabilities across graph nodes. To demonstrate Probabilistic Threat Propagation (PTP) considers the task of detecting malicious node in the network. Proposed System also shows the relationship between PTP and loopy belief propagation

Reference :

    1. Dr.Balachandra, D.N.Karthek,” An Overview on Security Issues in Cloud Computing”IOSR Journal of Computer Engineering,Volume 3, Issue 1, 2012
    2. Hamoud Alshammari and Christian Bach,”Administration Security Issues In Cloud Computing” International Journal of Information Technology Convergence and Services, Volume.3, No.3, August 2013
    3. Manavi, Sadra Mohammadalian, Nur Izura Udzir, Azizol Abdullah,” Secure Model for Virtualization Layer in Cloud Infrastructure” International Journal of CyberSecurity and Digital Forensics.The Society of Digital Information and Wireless Communications, 2012
    4. Mr. V.V.Prathap, Mrs.D.Saveetha,” Detecting Malware Intrusion in Network Environment” Mr. V.V.Prathap, International. Journal of Engineering Research and Applications, Volume. 3, Issue 3 ,Version 5, pp.75-80, March 2013
    5. Chung,Tianyi Xing,Dijiang Huang,” NICE: Network Intrusion Detectin and Countermeasure Selectionin Virtual Network Systems” IEEE Transaction on Dependable and Secure Computing, Volume. 10, No. 3, JULY/AUGUST 2013
    6. Shina Sheen,R Rajesh,” Network Intrusion Detection using Feature Selection and Decision tree classifier” IEEE Region 10 Conference,200
    7. Polat, K., & Gunes, S. (2007). An expert system approach based on principal component analysis and adaptive neuro-fuzzy inference system to diagnosis of diabetes disease. Digital Signal Processing, 17(4), 702– 710.
    8. Delen, D., Walker, G., & Kadam, A. (2005). Predicting breast cancer survivability: A comparison of three data mining methods. Artificial Intelligence in Medicine Artificial Intelligence in Medicine, 34(2), 113– 127.
    9. Kayaer, K., & Yildirim, T. (2003). Medical diagnosis on Pima Indian diabetes using general regression neural networks. In Proceedings of the international l conference on artificial neural networks and neural information processing (ICANN/ICONIP) (pp. 181–184).
    10. Temurtas, F. (2009). A comparative study on thyroid disease diagnosis using neural networks. Expert Systems with Applications, 36, 944–949
    11. Rumelhart, D. E., Hinton, G. E., & Williams, R. J. (1986). Learning internal representations by error propagation. In D. E. Rumelhart & J. L. McClelland (Eds.). Parallel distributed processing: Explorations in the microstructure of cognition (Vol. 1, pp. 318–362). Cambridge, MA: MIT Press.
    12. Brent, R. P. (1991). Fast training algorithms for multi-layer neural nets. IEEE Transactions on Neural Networks, 2, 346–354
    13. Gori, M., & Tesi, A. (1992). On the problem of local minima in backpropagation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 14, 76–85
    14. Gulbag, A. (2006). Dagaalty work **. Ph.D. Thesis, Sakarya University, Institute of Science & Technology.
    15. Gulbag, A., & Temurtas, F. (2006). A study on quantitative classification of binary gas mixture using neural networks and adaptive neuro fuzzy inference systems. Sensors and Actuators B, 115, 252–262
    16. Hagan, M. T., & Menhaj, M. (1994). Training feed forward networks with the Marquardt algorithm. IEEE Transactions on Neural Networks, 5, 989–993.

Recent Article