Sprinkling Data Prevents From Intruders

Abstract

The habitual communication of delay-tolerantnetwork (DTN) model is having partial infrastructural model for prevailing mobile patronsfor instance Bluetooth and Wi-Fi Direct. Mobile ad hoc network is an anthology of mobile nodes communicating through wireless channels lacking of any existing network infrastructure or centralized authority.Some of the most challenging issues in this scenario misbehaviours and burglar detection. Behavioral characterization of malware is an effective alternative to pattern matching in detecting malicious, especially when dealing with many networks or obfuscated malware. In this paper we propose trustable naive Bayesian (TNB)model. It is profitably function for wired networks but not applied for ad-hoc networks. In this paper we address major problem of Manetsmalicious nodes are produce fake estimations. We identify two exclusive challenges on Manets these are phony estimation of trustable node and un-estimated of spam node detection. Furthermore, we dogmatic filtering, and adaptive routing communication in Manets.

Authors and Affiliations

D. V. S Sujitha, S Babu

Keywords

Related Articles

Security in Web Application

Internet services and applications have become a part of daily life, enabling communications from anywhere. To accommodate this increase in applications and data complexity, web services has moved to multi-tiered desi...

UINN: Preventing Reidentification Of Senstive Social Network Data

Publishing or sharing the social network data for social science research and business analysis lack of privacy. Existing technique k-anonymity is used to prevent identification of microdata. Even though an attacker m...

FAME: A NOVEL FRAMEWORK FOR POLICY MANAGEMENT IN FIREWALL

In this paper investigate the problem of discovering the set of troublesome rules in a large firewall policy and consequently eliminating or resolving them. all the rules in the policy are consistent and can be reord...

Closed Loop Micro strip Antenna Design For Wireless Technology

A small Dual band microstrip patch antenna is introduced. The advance of communication systems requires new antenna designs to comply with the ever-increasing demands of the wireless market. This presented antenna is...

Security and Privacy in the Context of the Public Clouds

The present perspective on the confidential data hosted in the cloud is based on fine-grained encryption of the data. Under such approaches, data owners are in charge of encrypting the data before uploading them on t...

Download PDF file
  • EP ID EP28155
  • DOI -
  • Views 240
  • Downloads 1

How To Cite

D. V. S Sujitha, S Babu (2015). Sprinkling Data Prevents From Intruders. International Journal of Research in Computer and Communication Technology, 4(3), -. https://europub.co.uk/articles/-A-28155