Author
Listed:
- Banghua Wu
- Shah Nazir
- Neelam Mukhtar
Abstract
Security has become one of the important factors for any network communication and transmission of data packets. An organization with an optimal security system can lead to a successful business and can earn huge profit on the business they are doing. Different network devices are linked to route, compute, monitor, and communicate various real-time developments. The hackers are trying to attack the network and want to draw the organization’s significant information for its own profits. During the communication, if an intrusion or eavesdropping occurs, it will lead to a severe disfigurement of the whole communication network, and the data will be controlled by wrong malicious users. Identification of attack is a way to identify the security violations and analyze the measures in a computer network. An identification system, which is effective and accurate, can add security to the existing system for secure and smooth communication among end to end nodes and can work efficiently in the identification of attack on data packets. The role of information security is to design and protect the entire data of networks and maintain its confidentiality, integrity, and availability for their right users. Therefore, there is a need for end to end security management, which will ensure the security and privacy of the network and will save the data inside networks from malicious users. As the network devices are growing, so the level of threats is also increasing for these devices. The proposed research is an endeavor toward the detection of data packets attack by using the rough set theory for a secure end to end communication. The experimental work was performed by the RSES tool. The accuracy of the K -NN was 88% for the total objects of 8459. For cross validation purposes, the decision rules and decomposition tree algorithms were used. The DR algorithm showed accuracy of 59.1%, while the DT showed accuracy of 61.5%. The experimental results of the proposed study show that the research is capable of detecting data packets attack.
Suggested Citation
Banghua Wu & Shah Nazir & Neelam Mukhtar, 2020.
"Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication,"
Complexity, Hindawi, vol. 2020, pages 1-12, November.
Handle:
RePEc:hin:complx:6690569
DOI: 10.1155/2020/6690569
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:hin:complx:6690569. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Mohamed Abdelhakeem (email available below). General contact details of provider: https://www.hindawi.com .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.