A Methodology for Identification of the Guilt Agent based on IP Binding with MAC using Bivariate Gaussian Model

Abstract

Enormous increase in data in the current world presents a major threat to the organization. Most of the organization maintains some sort of data that is sensitive and must be protected against the loss and leakage. In the IT field, the large amount of data will be exchanged between the multiple points at every moment. During this allocation of the data from the organization to the third party, there are enormous probabilities of data loss, leakages or alteration. Mostly an email is being utilized for correspondence in the working environment and from web-based like logins to ledgers; thereby an email is turning into a standard business application. An email can be abused to leave organization's elusive information open to trade off. Along these lines, it might be of little surprise that muggings on messages are normal and these issues need to be addressed. This paper completely focuses on the concept of data leakage, the technique to detect the data leakage and prevention.

Authors and Affiliations

B. Raja Koti, Dr. G. V. S. Raj Kumar, Dr. Y. Srinivas, Dr. K. Naveen Kumar

Keywords

Related Articles

Enhancement in System Schedulability by Controlling Task Releases

In real-time systems fixed priority scheduling techniques are considered superior than the dynamic priority counterparts from implementation perspectives; however the dynamic priority assignments dominate the fixed prior...

Emotion Recognition based on EEG using LSTM Recurrent Neural Network

Emotion is the most important component in daily interaction between people. Nowadays, it is important to make the computers understand user’s emotion who interacts with it in human-computer interaction (HCI) systems. El...

Novel Conception of a Tunable RF MEMS Resonator

This paper presents a new monolithic microwave integrated circuit (MMIC) based on coplanar waveguide (CPW) design for a tunable resonator based on RF MEMS. This RF structure, which can be used for system on chip (SOC), i...

Cloud Based Public Collaboration System in Developing Countries

Governments in developing countries are increasingly making efforts to provide more access to information and services for citizens, businesses, and civil servants through smart devices. However, providing strategically...

Optimal Network Design for Consensus Formation: Wisdom of Networked Agents

The wisdom of crowds refers to the phenomenon in which the collective knowledge of a community is greater than the knowledge of any individual. This paper proposes a network design for the fastest and slowest consensus f...

Download PDF file
  • EP ID EP417658
  • DOI 10.14569/IJACSA.2018.091140
  • Views 91
  • Downloads 0

How To Cite

B. Raja Koti, Dr. G. V. S. Raj Kumar, Dr. Y. Srinivas, Dr. K. Naveen Kumar (2018). A Methodology for Identification of the Guilt Agent based on IP Binding with MAC using Bivariate Gaussian Model. International Journal of Advanced Computer Science & Applications, 9(11), 293-299. https://europub.co.uk/articles/-A-417658