PTP Method in Network Security for Misbehavior Detection Using Entropy
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Information Technology | India | Volume 5 Issue 2, February 2016

PTP Method in Network Security for Misbehavior Detection Using Entropy

Neha Pathak, R. S. Apare

A PTP method in network security for misbehavior detection system is a method of detecting malicious misbehavior activity within networks. The System detects the malicious node and blocks them by adding into Blacklist. Malicious nodes are the compromised machine present in the network, which performs the task given by bot server i.e. it does not forward the legitimate message to another node in network or send some other message to neighbor node. This system is based on Probabilistic threat propagation and Entropy. When the monitored network runs in normal way, the entropy values are relatively smooth. Otherwise, the entropy value of one or more features would changes. This proposed scheme is use in graph analysis for community detection. The proposed system enhances the prior community detection work by propagating threat probabilities across graph nodes. To demonstrate Probabilistic Threat Propagation (PTP) we consider the task of detecting malicious node in network.

Keywords: Botnet, Blacklist, Community Detection, Graph Algorithms, Network Security

Edition: Volume 5 Issue 2, February 2016

Pages: 1465 - 1469

Share this Article

How to Cite this Article?

Neha Pathak, R. S. Apare, "PTP Method in Network Security for Misbehavior Detection Using Entropy", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV161452, Volume 5 Issue 2, February 2016, 1465 - 1469

77 PDF Views | 57 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Blacklist'

Research Paper, Information Technology, India, Volume 5 Issue 2, February 2016

Pages: 1465 - 1469

PTP Method in Network Security for Misbehavior Detection Using Entropy

Neha Pathak, R. S. Apare

Share this Article

Case Studies, Information Technology, India, Volume 3 Issue 9, September 2014

Pages: 1784 - 1786

Child Pornography: A Nuisance

Vinod Kapoor, Priya Nagpal

Share this Article

Similar Articles with Keyword 'Network Security'

Research Paper, Information Technology, India, Volume 5 Issue 2, February 2016

Pages: 1465 - 1469

PTP Method in Network Security for Misbehavior Detection Using Entropy

Neha Pathak, R. S. Apare

Share this Article

Research Paper, Information Technology, Malaysia, Volume 2 Issue 12, December 2013

Pages: 352 - 357

A Study: Cryptology Techniques and Methodologies

Cutifa Safitri, Haroon Shoukat Ali, Jamaludin Bin Ibrahim

Share this Article

Research Paper, Information Technology, Kenya, Volume 4 Issue 3, March 2015

Pages: 349 - 351

An Enhanced and Dynamic Network Hardware Devices Security Using MAC Address

Emmilly Mbichi Mwangi

Share this Article

Research Paper, Information Technology, Saudi Arabia, Volume 6 Issue 3, March 2017

Pages: 2100 - 2104

Information and Computer Network Security Policy for Sudanese Telecom Companies

Mohamed Ibrahim Gali, Mudawi Al Musharaf, Abdelrahman Elsharif Karrar

Share this Article

Research Paper, Information Technology, India, Volume 7 Issue 3, March 2018

Pages: 846 - 849

System Monitoring and Communication

Omkar Kolambkar, Namita Kolambkar

Share this Article
Top