作者: K Saravanan , A Senthilkumar , None
DOI: 10.1007/S11277-015-2662-1
关键词:
摘要: To prevent and monitor the unauthorized usage of data access, security on network is implemented by authenticating data. Network intrusion detection system monitors traffic measures information to identify suspicious activities. In distributed networks, administrator has authorize user access. When large set concerned in applications two complex issues be solved are organization decision making. address these issues, a space efficient structure, called bloom filter used which effectively organizes decides presence reliability. However, using advanced filtering techniques, intruders easily hack authorized for operations. At same time, when processing information, it difficult access secured manner standard filters. enhance over from intruders, an enhanced technique presented represent secure applied like web caching, peer networks etc. Additionally, restrict dataset malicious activities with upper bound false-positive probability increasing its capacity as packet size increases. The occurrence cleared mapping elements appropriate setting database hash functions, minimizing number resets created at time improving mean hit ratio. An experimental evaluation done KDD cup 1999 extracted UCI repository estimate performance proposed link-based Performance measured terms false positive probability, negative ratio, scalability, security. results reveals that achieves 42.5 % higher against existing dynamic approach.