An Improved IDS Detection with Protection of Agent Collude Attacks?
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 1)Publication Date: 2014-01-30
Authors : L.Devi V.Santhiya;
Page : 539-547
Keywords : IDS; Network-level security and protection; distributed networks; data privacy; allocation strategies;
Abstract
There are chances like a data distributor had given his sensitive data to a set of trusted agents. These agents can be called as third parties. There are chances that some of the data is leaked and found in an unauthorized place. This situation is called IDS. In existing case, the method called watermarking is using to identify the leakage. Or also uses the technique like injecting fake data that appears to be realistic in the data. I propose data allocation strategies that improve the probability of identifying leakages. In enhancement work I include the investigation of agent guilt models that capture leakage scenarios.
Other Latest Articles
- ?? ????? ???? ????? ??? ?? ??? ???? ???? ?? ???????? ??? ????
- ??????????? ????? ?????? ????????? ????? ??? ?????? ??????? ???????? ??? ? ??? ?? ?????? ??? ?? ??????? ?? ?????? ?????
- ?????? ?????? ????? ???? ?? ????? ???? ? ???????? ??? ??????? ?? ?????? ?????? ???????
- ??? ??? ????? ?? ????????? ????? ?????? ????? ? ????? ????? ???? ?? ?? ?? ??????? ?? ??? ??????? ? ????? ???? ?????
- ????? ???? ???? ????? ????? ?????? ??????? ???? ?? ??????? ?? ????? ????? ????? ?????
Last modified: 2014-02-09 16:38:32