ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

An Improved IDS Detection with Protection of Agent Collude Attacks?

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 1)

Publication Date:

Authors : ;

Page : 539-547

Keywords : IDS; Network-level security and protection; distributed networks; data privacy; allocation strategies;

Source : Downloadexternal Find it from : Google Scholarexternal


There are chances like a data distributor had given his sensitive data to a set of trusted agents. These agents can be called as third parties. There are chances that some of the data is leaked and found in an unauthorized place. This situation is called IDS. In existing case, the method called watermarking is using to identify the leakage. Or also uses the technique like injecting fake data that appears to be realistic in the data. I propose data allocation strategies that improve the probability of identifying leakages. In enhancement work I include the investigation of agent guilt models that capture leakage scenarios.

Last modified: 2014-02-09 16:38:32