International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 103

Research Paper | Information Technology | India | Volume 5 Issue 2, February 2016


PTP Method in Network Security for Misbehavior Detection Using Entropy

Neha Pathak | R. S. Apare


Abstract: A PTP method in network security for misbehavior detection system is a method of detecting malicious misbehavior activity within networks. The System detects the malicious node and blocks them by adding into Blacklist. Malicious nodes are the compromised machine present in the network, which performs the task given by bot server i. e. it does not forward the legitimate message to another node in network or send some other message to neighbor node. This system is based on Probabilistic threat propagation and Entropy. When the monitored network runs in normal way, the entropy values are relatively smooth. Otherwise, the entropy value of one or more features would changes. This proposed scheme is use in graph analysis for community detection. The proposed system enhances the prior community detection work by propagating threat probabilities across graph nodes. To demonstrate Probabilistic Threat Propagation (PTP) we consider the task of detecting malicious node in network.


Keywords: Botnet, Blacklist, Community Detection, Graph Algorithms, Network Security


Edition: Volume 5 Issue 2, February 2016,


Pages: 1465 - 1469


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Neha Pathak, R. S. Apare, "PTP Method in Network Security for Misbehavior Detection Using Entropy", International Journal of Science and Research (IJSR), Volume 5 Issue 2, February 2016, pp. 1465-1469, https://www.ijsr.net/get_abstract.php?paper_id=NOV161452

Similar Articles with Keyword 'Network Security'

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, Saudi Arabia, Volume 6 Issue 3, March 2017

Pages: 2100 - 2104

Information and Computer Network Security Policy for Sudanese Telecom Companies

Mohamed Ibrahim Gali | Mudawi Al Musharaf | Abdelrahman Elsharif Karrar [6]

Share this Article

Downloads: 129

Research Paper, Information Technology, Kenya, Volume 4 Issue 3, March 2015

Pages: 349 - 351

An Enhanced and Dynamic Network Hardware Devices Security Using MAC Address

Emmilly Mbichi Mwangi

Share this Article
Top