Networking and Data Communication
- Version
- Download 64
- File Size 984.72 KB
- File Count 1
- Create Date 19 April 2023
- Last Updated 19 April 2023
Networking and Data Communication
Navya A M , Dr. Padmajadevi G ,
INTRODUCTION
The method may efficiently find rogue nodes by inspecting network traffic in real time. Our system is capable of creating a dynamic blacklist of Network nodes that may be used to block nodes whose trust levels are below a certain minimum. The detection of malicious nodes and the computation of node trust levels are handled by a central server. To increase the network and infrastructure's security, the method may be used in conjunction with other security tools including database activity monitoring, white listing, and data loss prevention. Session based encrypt is used to secure the node from the compromised attacker. Attacker request will be accepted by unique key of individual node validation process. Intruders wouldn't be able to steal TOP-SECRET data or information if this were done.. [1]
Download