Access Level Privacy Protection Data Contains Leak Protection
Swati Bisen
, Kapesh Raghatate
Access control, Malicious, PTP, Enforcing Security, Networks.
Access control is a fundamental security technique in systems in which multiple users share access to common resources. It is the process of stating and enforcing security A approach in network security for misbehavior detection system present a method for detecting malicious misbehavior activity within networks. Along with the detection, it also blocks the malicious system within the network and adds it to Blacklist. Malicious node defined as a compromised machine within the network that performs the task provided by i.e. it does not forward the legitimate message to another node in the network or send some other message to a neighbor node. This scheme is used in graph analysis for community detection. To demonstrate Probabilistic Threat Propagation (PTP) considers the task of detecting malicious node in the network. Proposed System also shows the relationship between PTP and loopy belief propagation.
"Access Level Privacy Protection Data Contains Leak Protection ", IJSDR - International Journal of Scientific Development and Research (www.IJSDR.org), ISSN:2455-2631, Vol.4, Issue 8, page no.328 - 330, August-2019, Available :https://ijsdr.org/papers/IJSDR1908054.pdf
Volume 4
Issue 8,
August-2019
Pages : 328 - 330
Paper Reg. ID: IJSDR_190949
Published Paper Id: IJSDR1908054
Downloads: 000347220
Research Area: Engineering
Country: chandrapur, maharashtra, chandrapur
ISSN: 2455-2631 | IMPACT FACTOR: 9.15 Calculated By Google Scholar | ESTD YEAR: 2016
An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 9.15 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator
Publisher: IJSDR(IJ Publication) Janvi Wave