A Methodology for Identification of the Guilt Agent based on IP Binding with MAC using Bivariate Gaussian Model

Abstract

Enormous increase in data in the current world presents a major threat to the organization. Most of the organization maintains some sort of data that is sensitive and must be protected against the loss and leakage. In the IT field, the large amount of data will be exchanged between the multiple points at every moment. During this allocation of the data from the organization to the third party, there are enormous probabilities of data loss, leakages or alteration. Mostly an email is being utilized for correspondence in the working environment and from web-based like logins to ledgers; thereby an email is turning into a standard business application. An email can be abused to leave organization's elusive information open to trade off. Along these lines, it might be of little surprise that muggings on messages are normal and these issues need to be addressed. This paper completely focuses on the concept of data leakage, the technique to detect the data leakage and prevention.

Authors and Affiliations

B. Raja Koti, Dr. G. V. S. Raj Kumar, Dr. Y. Srinivas, Dr. K. Naveen Kumar

Keywords

Related Articles

Improvement of Persian Spam Filtering by Game Theory

There are different methods for dealing with spams; however, since spammers continuously use tricks to defeat the proposed methods, hence, filters should be constantly updated. In this study, Stackelberg game was used to...

Modeling and Analyzing Anycast and Geocast Routing in Wireless Mesh Networks

Wireless technology has become an essential part of this era’s human life and has the capability of connecting virtually to any place within the universe. A mesh network is a self healing wireless network, built through...

Efficient Arnold and Singular Value Decomposition based Chaotic Image Encryption

This paper proposes an efficient image encryption that is based on Arnold transform (AT) and the Singular value decomposition (SVD). The proposed method employs AT on a plain image to transpose all image pixels in the p...

A Unified Forensic Framework for Data Identification and Collection in Mobile Cloud Social Network Applications

Mobile Cloud Computing (MCC) is the emerging and well accepted concept that significantly removes the constraints of mobile devices in terms of storage and computing capabilities and improves productivity, enhances perfo...

Effective Performance of Information Retrieval by using Domain Based Crawler

World Wide Web continuously introduces new capabilities and attracts many people[1]. It consists of more than 60 billion pages online. Due to this explosion in size, the information retrieval system or Search Engines are...

Download PDF file
  • EP ID EP417658
  • DOI 10.14569/IJACSA.2018.091140
  • Views 81
  • Downloads 0

How To Cite

B. Raja Koti, Dr. G. V. S. Raj Kumar, Dr. Y. Srinivas, Dr. K. Naveen Kumar (2018). A Methodology for Identification of the Guilt Agent based on IP Binding with MAC using Bivariate Gaussian Model. International Journal of Advanced Computer Science & Applications, 9(11), 293-299. https://europub.co.uk./articles/-A-417658