Network Database Security in Wireless Sensor Networks with Intellectual Access of using Outlier Detection Techniques
K. Satya Rajesh1, N. Raghavendra Sai2, Ch.Nagamani3

1K.Satya Rajesh, HOD, Dept. of Computer Science, C.S.T.S Govt, Kalasala, Janagreddygudem, W.G. Dist, A.P, India.
2N. Raghavendra Sai, Assoc. Prof, Dept. of CS &Engg, KoneruLakshmaiah Education Foundation, Vaddeswaram, AP, India.
3Ch.Nagamani, Research Scholar, Department of Computer Science, AcharyaNagarjuna University, Guntur, A.P, India.
Manuscript received on November 22, 2019. | Revised Manuscript received on December 15, 2019. | Manuscript published on December 30, 2019. | PP: 4660-4662 | Volume-9 Issue-2, December, 2019. | Retrieval Number: B5123129219/2019©BEIESP | DOI: 10.35940/ijeat.B5123.129219
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (

Abstract: In the field of information mining, exceptions are likewise alluded to as outliers, variations from the norm, discordant perceptions, or freaks. Other application spaces may utilize terms like exceptions, amazements, or contaminants. Every one of these wordings is catching a deviation from an expected ordinary information demonstration. In this research work, another system that comprises of an Intelligent Agent Based Access Control subsystem and Intrusion Detection subsystem for securing the Web Database has been proposed and actualized. With a specific end goal to give a viable access control framework, new access control variable based math and new arrangements utilizing rules have been proposed and executed. Keeping in mind the end goal to perform interruption and outlier identification successfully, a half and half Intelligent Agent based Intrusion Detection framework has been proposed in this work which enhances the security of the network database.
Keywords: Wireless sensor networks, Intrusion Detection System.