EVALUATE FAKE OBJECTS TO PREDICTS UNAUTHENTICATED DEVELOPERS
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 4
Abstract
Abstract: Modern business activities rely on extensive email exchange. Email leakages have become widespread, and the severe damage caused by such leakages constitutes a disturbing problem for organizations. In this paper we studied the following problem: In the course of doing business, sometimes the data distributor will give sensitive data to trusted third parties. Some of the data is leaked and found in an unauthorized place. The distributor cannot blame the agent without any evidence. Current approaches can detect the hackers but the total number of evidence will be less and the organization may not be able to proceed legally for further proceedings. In this work, we implement and analyze a guilt model that detects the agents using allocation strategies without modifying the original data. Our work identifies the agent who leaked the data with enough evidence. The main focus of this paper is to distribute the sensitive data “intelligently” to agents in order to improve the chances of detecting a guilty agent with strong evidence. The objective of our work is to improve the probability of identifying leakages using Data allocation strategies across the agents and also to identify the guilty party who leaked the data by injecting “realistic but fake” data records.
Authors and Affiliations
A. Santhi Lakshmi , Prof. C. Rajendra,
Face Recognition Using Principal Component Analysis Method
This paper mainly addresses the building of face recognition system by using Principal Component Analysis (PCA). PCA is a statistical approach used for reducing the number of variables in face recognition. In PCA...
A Novel approach for Optimizing Cross Layer among Physical Layer and MAC Layer of Infrastructure Based Wireless Network using Genetic Algorithm
Cross-layer awareness optimization is a break out from the layered approach of the OSI Layer communications model having very rigorous boundaries among layers. The CLAO approach transports response dynamically via the la...
A Survey on Algorithms for Cluster Head Selection in WSN
Wireless Sensor Network is a resource constraint network, in which all sensor nodes have limited resources. In order to save resources and energy data must be aggregated to reduce the amount of traffic in the netwo...
A modified Clustering algorithm based on Optimization method.
This study presents an effective optimization technique such as Ant Colony Optimization (ACO), Particle Swarm Optimization (PCO) and Fuzzy C-Means (FCM) for clustering the dataset. This technique is tested on sever...
Compare the results of Tuning of PID controller by using PSO and GA Technique for AVR system
—This paper Present to design method for determining the optimal proportional-integral-derivative (PID) controller parameters of an Automatic Voltage Regulator (AVR) system using the particle swarm optimization (...