{"title":"网络与数据通信","authors":"Navya A M, Dr. Padmajadevi G","doi":"10.55041/isjem00355","DOIUrl":null,"url":null,"abstract":"The method may efficiently find rogue nodes by inspecting network traffic in real time. Our system is capable of creating a dynamic blacklist of Network nodes that may be used to block nodes whose trust levels are below a certain minimum. The detection of malicious nodes and the computation of node trust levels are handled by a central server. To increase the network and infrastructure's security, the method may be used in conjunction with other security tools including database activity monitoring, white listing, and data loss prevention. Session based encrypt is used to secure the node from the compromised attacker. Attacker request will be accepted by unique key of individual node validation process. Intruders wouldn't be able to steal TOP-SECRET data or information if this were done.. [1]","PeriodicalId":285811,"journal":{"name":"International Scientific Journal of Engineering and Management","volume":"87 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Networking and Data Communication\",\"authors\":\"Navya A M, Dr. Padmajadevi G\",\"doi\":\"10.55041/isjem00355\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The method may efficiently find rogue nodes by inspecting network traffic in real time. Our system is capable of creating a dynamic blacklist of Network nodes that may be used to block nodes whose trust levels are below a certain minimum. The detection of malicious nodes and the computation of node trust levels are handled by a central server. To increase the network and infrastructure's security, the method may be used in conjunction with other security tools including database activity monitoring, white listing, and data loss prevention. Session based encrypt is used to secure the node from the compromised attacker. Attacker request will be accepted by unique key of individual node validation process. Intruders wouldn't be able to steal TOP-SECRET data or information if this were done.. [1]\",\"PeriodicalId\":285811,\"journal\":{\"name\":\"International Scientific Journal of Engineering and Management\",\"volume\":\"87 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-04-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Scientific Journal of Engineering and Management\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.55041/isjem00355\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Scientific Journal of Engineering and Management","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.55041/isjem00355","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The method may efficiently find rogue nodes by inspecting network traffic in real time. Our system is capable of creating a dynamic blacklist of Network nodes that may be used to block nodes whose trust levels are below a certain minimum. The detection of malicious nodes and the computation of node trust levels are handled by a central server. To increase the network and infrastructure's security, the method may be used in conjunction with other security tools including database activity monitoring, white listing, and data loss prevention. Session based encrypt is used to secure the node from the compromised attacker. Attacker request will be accepted by unique key of individual node validation process. Intruders wouldn't be able to steal TOP-SECRET data or information if this were done.. [1]