International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Downloads: 103 | Views: 118

Research Paper | Information Technology | India | Volume 5 Issue 2, February 2016

PTP Method in Network Security for Misbehavior Detection Using Entropy

Neha Pathak | R. S. Apare

Abstract: A PTP method in network security for misbehavior detection system is a method of detecting malicious misbehavior activity within networks. The System detects the malicious node and blocks them by adding into Blacklist. Malicious nodes are the compromised machine present in the network, which performs the task given by bot server i. e. it does not forward the legitimate message to another node in network or send some other message to neighbor node. This system is based on Probabilistic threat propagation and Entropy. When the monitored network runs in normal way, the entropy values are relatively smooth. Otherwise, the entropy value of one or more features would changes. This proposed scheme is use in graph analysis for community detection. The proposed system enhances the prior community detection work by propagating threat probabilities across graph nodes. To demonstrate Probabilistic Threat Propagation (PTP) we consider the task of detecting malicious node in network.

Keywords: Botnet, Blacklist, Community Detection, Graph Algorithms, Network Security

Edition: Volume 5 Issue 2, February 2016,

Pages: 1465 - 1469

How to Download this Article?

Type Your Email Address below to Download the Article PDF

How to Cite this Article?

Neha Pathak, R. S. Apare, "PTP Method in Network Security for Misbehavior Detection Using Entropy", International Journal of Science and Research (IJSR), Volume 5 Issue 2, February 2016, pp. 1465-1469,

Similar Articles with Keyword 'Network Security'

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, Saudi Arabia, Volume 6 Issue 3, March 2017

Pages: 2100 - 2104

Information and Computer Network Security Policy for Sudanese Telecom Companies

Mohamed Ibrahim Gali | Mudawi Al Musharaf | Abdelrahman Elsharif Karrar [6]

Share this Article

Downloads: 129

Research Paper, Information Technology, Kenya, Volume 4 Issue 3, March 2015

Pages: 349 - 351

An Enhanced and Dynamic Network Hardware Devices Security Using MAC Address

Emmilly Mbichi Mwangi

Share this Article