Research Paper | Information Technology | India | Volume 5 Issue 2, February 2016
PTP Method in Network Security for Misbehavior Detection Using Entropy
Neha Pathak, R. S. Apare
A PTP method in network security for misbehavior detection system is a method of detecting malicious misbehavior activity within networks. The System detects the malicious node and blocks them by adding into Blacklist. Malicious nodes are the compromised machine present in the network, which performs the task given by bot server i.e. it does not forward the legitimate message to another node in network or send some other message to neighbor node. This system is based on Probabilistic threat propagation and Entropy. When the monitored network runs in normal way, the entropy values are relatively smooth. Otherwise, the entropy value of one or more features would changes. This proposed scheme is use in graph analysis for community detection. The proposed system enhances the prior community detection work by propagating threat probabilities across graph nodes. To demonstrate Probabilistic Threat Propagation (PTP) we consider the task of detecting malicious node in network.
Keywords: Botnet, Blacklist, Community Detection, Graph Algorithms, Network Security
Edition: Volume 5 Issue 2, February 2016
Pages: 1465 - 1469
How to Cite this Article?
Neha Pathak, R. S. Apare, "PTP Method in Network Security for Misbehavior Detection Using Entropy", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV161452, Volume 5 Issue 2, February 2016, 1465 - 1469
128 PDF Views | 86 PDF Downloads
Similar Articles with Keyword 'Blacklist'
Research Paper, Information Technology, India, Volume 5 Issue 2, February 2016
Pages: 1465 - 1469PTP Method in Network Security for Misbehavior Detection Using Entropy
Neha Pathak, R. S. Apare
Case Studies, Information Technology, India, Volume 3 Issue 9, September 2014
Pages: 1784 - 1786Child Pornography: A Nuisance
Vinod Kapoor, Priya Nagpal
Similar Articles with Keyword 'Network Security'
Research Paper, Information Technology, India, Volume 5 Issue 2, February 2016
Pages: 1465 - 1469PTP Method in Network Security for Misbehavior Detection Using Entropy
Neha Pathak, R. S. Apare
Research Paper, Information Technology, Saudi Arabia, Volume 6 Issue 3, March 2017
Pages: 2100 - 2104Information and Computer Network Security Policy for Sudanese Telecom Companies
Mohamed Ibrahim Gali, Mudawi Al Musharaf, Abdelrahman Elsharif Karrar
Research Paper, Information Technology, Malaysia, Volume 2 Issue 12, December 2013
Pages: 352 - 357A Study: Cryptology Techniques and Methodologies
Cutifa Safitri, Haroon Shoukat Ali, Jamaludin Bin Ibrahim
Research Paper, Information Technology, Kenya, Volume 4 Issue 3, March 2015
Pages: 349 - 351An Enhanced and Dynamic Network Hardware Devices Security Using MAC Address
Emmilly Mbichi Mwangi
Research Paper, Information Technology, Kenya, Volume 7 Issue 3, March 2018
Pages: 1355 - 1362Development of a Hybrid Intrusion Detection System for Security Analysis at the IP Layer
Arphaxad Kioko Muia