Main Reference PaperBayesian Mechanisms and Detection Methods for Wireless Network with Malicious Users, IEEE Transactions on Mobile Computing, 2016 [Java].
  • Machine learning algorithm based malicious user detection method is proposed in which anomalies utility functions in terms of QoS are estimated and the anomalies behavior of malicious user is observed and detected. Bayesian pricing and auction is udpated as per the detection and it also assist in detection of malicious users in future.

+ Description
  • Machine learning algorithm based malicious user detection method is proposed in which anomalies utility functions in terms of QoS are estimated and the anomalies behavior of malicious user is observed and detected. Bayesian pricing and auction is udpated as per the detection and it also assist in detection of malicious users in future.

  • To detect the malicious behavior of the user and assign high pricing to them.

  • To avoid additional detection mechanism through the detecting malicious users from pricing mechanism.

+ Aim & Objectives
  • To detect the malicious behavior of the user and assign high pricing to them.

  • To avoid additional detection mechanism through the detecting malicious users from pricing mechanism.

  • A technique is contributed to differentiate the abnormal behavior of the normal node from attacker due to dynamic network conditions.

+ Contribution
  • A technique is contributed to differentiate the abnormal behavior of the normal node from attacker due to dynamic network conditions.

  • Java JDK 1.8, MySQL 5.5.40.

  • Netbeans 8.0.1, & J2SE.

+ Software Tools & Technologies
  • Java JDK 1.8, MySQL 5.5.40.

  • Netbeans 8.0.1, & J2SE.

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.