A Methodology for Identification of the Guilt Agent based on IP Binding with MAC using Bivariate Gaussian Model

Abstract

Enormous increase in data in the current world presents a major threat to the organization. Most of the organization maintains some sort of data that is sensitive and must be protected against the loss and leakage. In the IT field, the large amount of data will be exchanged between the multiple points at every moment. During this allocation of the data from the organization to the third party, there are enormous probabilities of data loss, leakages or alteration. Mostly an email is being utilized for correspondence in the working environment and from web-based like logins to ledgers; thereby an email is turning into a standard business application. An email can be abused to leave organization's elusive information open to trade off. Along these lines, it might be of little surprise that muggings on messages are normal and these issues need to be addressed. This paper completely focuses on the concept of data leakage, the technique to detect the data leakage and prevention.

Authors and Affiliations

B. Raja Koti, Dr. G. V. S. Raj Kumar, Dr. Y. Srinivas, Dr. K. Naveen Kumar

Keywords

Related Articles

Multimodal Biometric Person Authentication using Speech, Signature and Handwriting Features

The objective of this work is to develop a multimodal biometric system using speech, signature and handwriting information. Unimodal biometric person authentication systems are initially developed for each of these biome...

A Strategy to Improve The Usage of ICT in The Kingdom of Saudi Arabia Primary School

Integration of ICT in education is a complex idea that requires practical interpretation to get significant outcomes. As a developing country, the Kingdom of Saudi Arabia (the KSA) does not have a proper technological in...

Hierarchical Cellular Structures in High-Capacity Cellular Communication Systems 

In the prevailing cellular environment, it is important to provide the resources for the fluctuating traffic demand exactly in the place and at the time where and when they are needed. In this paper, we explored the abil...

Finding Attractive Research Areas for Young Scientists

The selection of the research area is very vital for new researchers. One of the major issues for researchers is the selection of the domain of research on which he/she can carry out research. This case is very vital on...

Blood Vessels Segmentation in Retinal Fundus Image using Hybrid Method of Frangi Filter, Otsu Thresholding and Morphology

Diagnosis of computer-based retinopathic hypertension is done by analyzing of retinal images. The analysis is carried out through various stages, one of which is blood vessel segmentation in retinal images. Vascular segm...

Download PDF file
  • EP ID EP417658
  • DOI 10.14569/IJACSA.2018.091140
  • Views 56
  • Downloads 0

How To Cite

B. Raja Koti, Dr. G. V. S. Raj Kumar, Dr. Y. Srinivas, Dr. K. Naveen Kumar (2018). A Methodology for Identification of the Guilt Agent based on IP Binding with MAC using Bivariate Gaussian Model. International Journal of Advanced Computer Science & Applications, 9(11), 293-299. https://europub.co.uk/articles/-A-417658