Network Threat Identification using Digital Ant Technology
B. Vasantha Rani1, G Ravikumar2, K G Prasanthi3
1B Vasantha Rani, Assistant Prof. Department of Computer Science and Engineering, Vignan Institute of Information Technology, India.
2G Ravi Kumar, Assistant Professor in Vignan’s Institute of Information Technology, Visakhapatnam, Duvvada. India.
3K G Prasanthi, Department of Master of computer application Vignan Institute of Information Techonology, Duvvada, India.
Manuscript received on 14 April 2019 | Revised Manuscript received on 19 May 2019 | Manuscript published on 30 May 2019 | PP: 820-824 | Volume-8 Issue-1, May 2019 | Retrieval Number: A9224058119/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: This paper projects a Network Threat Identification Using Digital Ant Technologyis aimed at providing identification of threats. In the present day digital technology, many of the transactions are being carried out by using networks. In order to transfer the data and to share other resources in a secure manner, it is inevitable to protect the network from malicious attacks because of the new type of threats. In this context, it is described to make use of the digital ant technology in an intelligent manner. The project describes about the Ant Colony procedure which is an optimum method to solve combinatorial (single problem many solutions) problems like Travelling Sales Man problem. Further, this project will describe the process of implementing the ant colony inspired digital ant methodology to identify threats in a small scale Computer Network in an intelligent manner. This project will help to protect insider attacks in a geographically confined Local Area Networks (LAN) providing optimum resource usage.
Index Terms: Antecedents, Sentinel, Digital Ant, Sergeant, Cluster, Assailant Module.
Scope of the Article: Digital Clone or Simulation