Keywords : Attack
Identification and Recognizing of Security System for Various Interruptions using ANN Algorithm
European Journal of Molecular & Clinical Medicine,
2020, Volume 7, Issue 4, Pages 27-32
Framework security is of basic disturbed now days for broad setup. The interference area systems (IDS) are getting the chance to be fundamental for palatable confirmation against ambushes that are reliably changing in result and multifaceted nature. With data devotion, acknowledgment and accessibility, they ought to be reliable, easy to control and by low conservation cost. Diverse alteration is associated with IDS routinely to depict new strikes and finger them. Present paper recommends a soft inherited figuring (SIF) for intrusion area. The SIF structure is a soft classifier, whose learning curved, be shown as a feathery rule, for instance, expecting by then and overhauled by an intrinsic count. The technique is accepted on the model KDD'99 interference instructive file and associated by enduring limit available in the composition. The consequences are solid and show the upsides of the recommended getting to
Sensitive Label Security Preservation with Anatomization for Data Publishing
European Journal of Molecular & Clinical Medicine,
2020, Volume 7, Issue 4, Pages 2992-2998
Maintaining privacy in data publishing is a major challenge. In complex world sensitive information privacy is the main issue. Many algorithms are used to protect sensitive information in mined data which is not efficient because resulted output can be easily linked with public data so it shows user identity. Many techniques are used to protect privacy in data mining. Anatomization approaches aim to avoid directly use of sensitive data. The growing popularity and development of anatomization technologies bring sensitive data and protect the security of sensitive information Anatomization. The anatomization approach dissociates the correlation observed between the quasi identifier attributes and sensitive attributes and yields two separate tables with non-overlapping attributes. In the slicing algorithm, vertical partitioning does the grouping of the correlated sensitive attributes in sensitive table together and thereby minimizes the dimensionality. Consequently, it becomes increasingly important to preserve the privacy of published data. An attacker is apt to identify an individual from the published tables, with attacks through the record linkage, attribute linkage, table linkage or probabilistic attack. Two comprehensive sets of real-world relationship data are applied to evaluate the performance of our anonymization approach. Simulations and privacy analysis show our scheme possesses better privacy while ensuring higher utility.