Sprinkling Data Prevents From Intruders
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 3
Abstract
The habitual communication of delay-tolerantnetwork (DTN) model is having partial infrastructural model for prevailing mobile patronsfor instance Bluetooth and Wi-Fi Direct. Mobile ad hoc network is an anthology of mobile nodes communicating through wireless channels lacking of any existing network infrastructure or centralized authority.Some of the most challenging issues in this scenario misbehaviours and burglar detection. Behavioral characterization of malware is an effective alternative to pattern matching in detecting malicious, especially when dealing with many networks or obfuscated malware. In this paper we propose trustable naive Bayesian (TNB)model. It is profitably function for wired networks but not applied for ad-hoc networks. In this paper we address major problem of Manetsmalicious nodes are produce fake estimations. We identify two exclusive challenges on Manets these are phony estimation of trustable node and un-estimated of spam node detection. Furthermore, we dogmatic filtering, and adaptive routing communication in Manets.
Authors and Affiliations
D. V. S Sujitha, S Babu
Security in Web Application
Internet services and applications have become a part of daily life, enabling communications from anywhere. To accommodate this increase in applications and data complexity, web services has moved to multi-tiered desi...
UINN: Preventing Reidentification Of Senstive Social Network Data
Publishing or sharing the social network data for social science research and business analysis lack of privacy. Existing technique k-anonymity is used to prevent identification of microdata. Even though an attacker m...
FAME: A NOVEL FRAMEWORK FOR POLICY MANAGEMENT IN FIREWALL
In this paper investigate the problem of discovering the set of troublesome rules in a large firewall policy and consequently eliminating or resolving them. all the rules in the policy are consistent and can be reord...
Closed Loop Micro strip Antenna Design For Wireless Technology
A small Dual band microstrip patch antenna is introduced. The advance of communication systems requires new antenna designs to comply with the ever-increasing demands of the wireless market. This presented antenna is...
Security and Privacy in the Context of the Public Clouds
The present perspective on the confidential data hosted in the cloud is based on fine-grained encryption of the data. Under such approaches, data owners are in charge of encrypting the data before uploading them on t...