International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 103

Research Paper | Information Technology | India | Volume 5 Issue 2, February 2016


PTP Method in Network Security for Misbehavior Detection Using Entropy

Neha Pathak | R. S. Apare


Abstract: A PTP method in network security for misbehavior detection system is a method of detecting malicious misbehavior activity within networks. The System detects the malicious node and blocks them by adding into Blacklist. Malicious nodes are the compromised machine present in the network, which performs the task given by bot server i. e. it does not forward the legitimate message to another node in network or send some other message to neighbor node. This system is based on Probabilistic threat propagation and Entropy. When the monitored network runs in normal way, the entropy values are relatively smooth. Otherwise, the entropy value of one or more features would changes. This proposed scheme is use in graph analysis for community detection. The proposed system enhances the prior community detection work by propagating threat probabilities across graph nodes. To demonstrate Probabilistic Threat Propagation (PTP) we consider the task of detecting malicious node in network.


Keywords: Botnet, Blacklist, Community Detection, Graph Algorithms, Network Security


Edition: Volume 5 Issue 2, February 2016,


Pages: 1465 - 1469


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Neha Pathak, R. S. Apare, "PTP Method in Network Security for Misbehavior Detection Using Entropy", International Journal of Science and Research (IJSR), Volume 5 Issue 2, February 2016, pp. 1465-1469, https://www.ijsr.net/get_abstract.php?paper_id=NOV161452

Similar Articles with Keyword 'Network Security'

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, United States of America, Volume 13 Issue 10, October 2024

Pages: 914 - 917

Data Governance and Security - A Comprehensive Review of Snowflake and Databricks

Rameshbabu Lakshmanasamy [3]

Share this Article

Downloads: 4 | Weekly Hits: ⮙3 | Monthly Hits: ⮙3

Research Paper, Information Technology, India, Volume 6 Issue 1, January 2017

Pages: 2487 - 2494

Cybersecurity Strategies for Legacy Telecom Systems: Developing Tailored Cybersecurity Strategies to Secure aging Telecom Infrastructures against Modern Cyber Threats, Leveraging your Experience with Legacy Systems and Cybersecurity Practices

Jeevan Manda [4]

Share this Article
Top