Network Database Security in Wireless Sensor Networks with Intellectual Access of using Outlier Detection Techniques

  • et al.
N/ACitations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In the field of information mining, exceptions are likewise alluded to as outliers, variations from the norm, discordant perceptions, or freaks. Other application spaces may utilize terms like exceptions, amazements, or contaminants. Every one of these wordings is catching a deviation from an expected ordinary information demonstration. In this research work, another system that comprises of an Intelligent Agent Based Access Control subsystem and Intrusion Detection subsystem for securing the Web Database has been proposed and actualized. With a specific end goal to give a viable access control framework, new access control variable based math and new arrangements utilizing rules have been proposed and executed. Keeping in mind the end goal to perform interruption and outlier identification successfully, a half and half Intelligent Agent based Intrusion Detection framework has been proposed in this work which enhances the security of the network database.

Cite

CITATION STYLE

APA

Rajesh, K. S., Sai, N. R., & Nagamani, Ch. (2019). Network Database Security in Wireless Sensor Networks with Intellectual Access of using Outlier Detection Techniques. International Journal of Engineering and Advanced Technology, 9(2), 4660–4662. https://doi.org/10.35940/ijeat.b5123.129219

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free