EVALUATE FAKE OBJECTS TO PREDICTS UNAUTHENTICATED DEVELOPERS  

Abstract

Abstract: Modern business activities rely on extensive email exchange. Email leakages have become widespread, and the severe damage caused by such leakages constitutes a disturbing problem for organizations. In this paper we studied the following problem: In the course of doing business, sometimes the data distributor will give sensitive data to trusted third parties. Some of the data is leaked and found in an unauthorized place. The distributor cannot blame the agent without any evidence. Current approaches can detect the hackers but the total number of evidence will be less and the organization may not be able to proceed legally for further proceedings. In this work, we implement and analyze a guilt model that detects the agents using allocation strategies without modifying the original data. Our work identifies the agent who leaked the data with enough evidence. The main focus of this paper is to distribute the sensitive data “intelligently” to agents in order to improve the chances of detecting a guilty agent with strong evidence. The objective of our work is to improve the probability of identifying leakages using Data allocation strategies across the agents and also to identify the guilty party who leaked the data by injecting “realistic but fake” data records.  

Authors and Affiliations

A. Santhi Lakshmi , Prof. C. Rajendra,

Keywords

Related Articles

Determination of Noise Levels in Using AMS Features of Noisy Speech Signal and Their Comparison  

Great difficulty in recognizing speech is under a noisy background. The signal to noise ratio plays a very important role in speech recognition techniques. The signal to noise ratio is the ratio of the signal estim...

REVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS

A Mobile Ad hoc network (MANET) is a collection of mobile nodes that is connected through a wireless medium forming a dynamic network. An Ad hoc network doesn’t have any centralized arbitrator or server. In ad hoc networ...

Linearized Modeling of Single Machine Infinite Bus Power System and Controllers for Small Signal Stability Investigation and Enhancement 

Small signal stability investigation is vital as the system outage due small signal perturbation being unknown to the system operators. The small signal disturbance may be initiating event for large system outage....

F-Measure Metric for English to Hindi Language Machine Translation 

The main objective of MT is to break the language barrier in a multilingual nation like India. Evaluation of MT is required for Indian languages because the same MT is not works in Indian language as in European la...

A Survey of Performance based Secure Routing Protocols in MANET 

An ad-hoc network is a multi-hop wireless network where all nodes cooperatively maintain network connectivity without a centralized infrastructure. If these nodes change their positions dynamically, it is called a...

Download PDF file
  • EP ID EP130987
  • DOI -
  • Views 114
  • Downloads 0

How To Cite

A. Santhi Lakshmi, Prof. C. Rajendra, (2012). EVALUATE FAKE OBJECTS TO PREDICTS UNAUTHENTICATED DEVELOPERS  . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 1(4), 547-551. https://europub.co.uk/articles/-A-130987