This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
|
||||||||
|
Paper Details
Paper Title
SECURE FILE TRANSFER AND INTRUSION DETECTIONIN A NETWORK: A BAYSEIAN GAME THEORETIC-METHODOLOGY
Authors
  Akshay Agarwal,  Mohit Chaudhary,  M.Uma Devi
Abstract
Progresses in remote interchanges and microelectronics have initiated the advancement of unmanned flying vehicles (UAVs), which can be utilized to expand a ground arrange made out of sensors and additionally vehicles keeping in mind the end goal to build scope, upgrade the end-to-end delay, and enhance information handling. While UAV-helped systems can conceivably discover applications in numerous regions, various issues, especially security, have not been promptly tended to. The interruption recognition framework is the most generally utilized procedure to recognize assailants.
In this paper, we concentrate on tending to two fundamental issues inside the setting of interruption recognition and aggressor launch in UAV-helped systems, to be specific, actuation of the interruption observing procedure and assailant discharge. Actually, when an extensive number of hubs enact their checking forms, the brought about overhead can be considerable and, as a result, corrupts the system execution. Accordingly, a tradeoff between the interruption identification rate and overhead is considered in this work. It is not generally the best methodology to launch a hub quickly when it displays an awful indication of malignant exercises since this sign could be temporary (the hub may change to an ordinary conduct later on) or be just because of commotion or problematic correspondences. Along these lines, a situation amongst identification and false positive rates is considered in this paper. We propose to address these two security issues by a Bayesian amusement show keeping in mind the end goal to precisely distinguish assaults (i.e., high discovery and low false positive rates) with a low overhead. Reenactment comes about have exhibited that our proposed security amusement system achieves solid identification.
Keywords- intrusion,multihop,packet
Publication Details
Unique Identification Number - IJEDR1702071Page Number(s) - 413-416Pubished in - Volume 5 | Issue 2 | April 2017DOI (Digital Object Identifier) -    Publisher - IJEDR (ISSN - 2321-9939)
Cite this Article
  Akshay Agarwal,  Mohit Chaudhary,  M.Uma Devi,   "SECURE FILE TRANSFER AND INTRUSION DETECTIONIN A NETWORK: A BAYSEIAN GAME THEORETIC-METHODOLOGY", International Journal of Engineering Development and Research (IJEDR), ISSN:2321-9939, Volume.5, Issue 2, pp.413-416, April 2017, Available at :http://www.ijedr.org/papers/IJEDR1702071.pdf
Article Preview
|
|
||||||
|