3 research outputs found

    Collaborative Profile Assessment to Secure MANET by DDOS Attack

    Get PDF
    In the Mobile Ad-hoc Network, nodes bind together in the centralised authority's absence because reliability is one of the main challenges. The MANETS protective architecture provides some consequential problems due to the specific features of MANETS. The DDoS attack in the network is not quickly detectable. A management infrastructure that guarantees extensive security and the required network performance from attacks must be developed to overcome the barriers. Direct methods cannot be found successfully in mobile ad hoc networks in which network topology differs animatedly. Different DDoS security systems boost the network's output in front of an attacker to deactivate mismanagement, like NTRS. In this study, the Distributed Profile Evaluation Mechanism (DPEAP) DDoS Attack Effect in the Network proposes that compromise packets tossed out of the network beyond the network's capacity. The NTRS was a modern methodology in the study, and the DPEAP suggested is a new technique. The DPEAP identifies the attacker's behaviour by matching an attacker's profile with the ordinary nodes on the network, provided that the Node Profile is regular in the foaming of the proper network data delivery. The DPEAP then declare that the attacker's network has no hazard. In contrast with NTRS in MANET, the DPEAP method is stable and efficient

    Privacy Preserving Using Randomization and Encryption Methods

    No full text
    Abstract: The technology of data mining is used in extraction of useful knowledge from large data sets. The process of data collection and data dissemination may, however, result in an inherent risk of privacy threats. Before publishing or sharing private information about individuals, businesses and organizations have to be suppressed. Privacy-preserving data mining has thus become an important issue in current years. This paper has review of evolutionary privacypreserving data mining technology to find appropriate method to perform secure transactions into a database
    corecore