Security
What's worse than getting hit with a security breach? Getting hit with an easily preventable one.
-
Security and Privacy in Biometrics: A Review
The term "Biometrics" is derived from the Greek words bio (life) and metric (to measure).It refers to the automated recognition of individuals based on their physiological or behavioural traits like f...
Provided By International Scientific Research Organization for Science, Engineering and Technology
-
Secured Position Based Grid Location Service for MANET Using SGF
Position based routing protocols can offer a significant performance increase over traditional ad hoc routing protocols. Correctness of location messages. These routing protocols use geographical info...
Provided By International Scientific Research Organization for Science, Engineering and Technology
-
NIDS Based on Multi Agent Systems in DataMining
Network Intrusion Detection System is used to detect any intruder which might have entered into the computer system. Data mining refers to data from large amounts of data. Data mining can be used for ...
Provided By International Journal of Scientific Research Engineering &Technology (IJSRET)
-
A Survey on Software Security Testing Techniques
This paper briefs a survey on software security techniques. Software security testing is not the identical as testing the correctness and competence of security functions implemented by software, whic...
Provided By International Journal of Computer Science and Telecommunications
-
Design and Development of a Framework to Mitigate DoS/DDoS Attacks Using IPtables Firewall
A DoS (Denial of Service) attack is characterized by an explicit attempt to prevent the legitimate use of a service. These attacks overwhelm the processing or link capacity of the target sites by satu...
Provided By International Journal of Computer Science and Telecommunications
-
Face and Gait Fusion Methods: A Survey
Biometric authentication of a person is highly challenging and complex problem. Face and gait identifications in video have received significant attention. Consequently, their identification problems ...
Provided By International Journal of Computer Science and Telecommunications
-
New Algorithm for SIP Flooding Attack Detection
Voice over Internet Protocol (VoIP) services are based on standardized and open technologies (i.e., SIP, H.323) using servers reachable through the Internet, implemented in software and provided often...
Provided By International Journal of Computer Science and Telecommunications
-
Intrusion Detection Systems: A Survey and Analysis of Classification Techniques
Today it is very important to provide a high level security to protect highly sensitive and private information. Intrusion Detection System is an essential technology in Network Security. Nowadays res...
Provided By International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE)
-
A Prototype for Secure Digital Library Accessing System Using Multimodal Biometric System
For some applications it is necessary that the user has to get authenticated himself either by using his password or any biometric features. No doubt that this gives protection against unauthorized en...
Provided By International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE)
-
A Study on Firewall Policy Anomaly Representation Techniques
A firewall is a system that acts as an interface between private network and a public network. It implements the security policy based on the rules defined by the network administrator; which decides ...
Provided By International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE)
-
A Review of Packet Marking IP Traceback Schemes
Today, Internet has become the primary source of communication in networks. The attack on its infrastructure poses a great challenge in its expansion. Distributed Denial of Service attack is a serious...
Provided By International Journal of Computer Applications
-
A Review on Hybrid Intrusion Detection System Using Artificial Immune System Approaches
With the growing advances in the technology the uses of computer systems and the Internet is also growing at a rapid rate, and with the increase in their usage vulnerabilities and threats are also inc...
Provided By International Journal of Computer Applications
-
Network Analysis and Remote Application Control Software Based on Client-Server Architecture
In this paper, the authors outlines a comprehensive model to increase system efficiency, preserve network bandwidth, monitor incoming and outgoing packets, ensure the security of confidential files an...
Provided By International Journal of Computer Applications
-
Design and Implementation of Secure Stream Cipher Based on Elliptic Curves on Time Shared Basis
In this paper, the authors propose the implementation of an Elliptic Curve (EC) cryptosystem which is aimed to provide secure stream ciphers, hash functions and key exchange in a time shared manner. T...
Provided By International Journal of Computer Applications
-
Alleviation of Application Layer DDoS Attacks Using Data Specification Module
Distribute Denial of Service (DDoS) attacks can inflict chaos on any susceptible web site. The goal of these attacks is to consume the network bandwidth and reject services to legitimate users of the ...
Provided By International Journal of Computer Science and Network Security
-
The Design of Vulnerability Management System
As the number of users using the internet has increased, recently the internet services have been growing rapidly. And the number of attacks for the internet services has been growing rapidly because ...
Provided By International Journal of Computer Science and Network Security
-
Analysis of Streaming Services and Security Issues in Peer-to-Peer Network
A P2P network is a special type of computer network that exhibits self-organization, symmetric communication, and distributed control. P2P streaming systems can be classified into P2P live streaming s...
Provided By International Journal of Computer Science and Network Security
-
New Data Encryption Standard Algorithm
A goal is the design of any encryption algorithm must be security against unauthorized attacks. Within the last decade, there has been a vast increase in the accumulation and communication of digital ...
Provided By International Journal of Computer Science and Network Security
-
An Efficient Routing Protocol for Mobile Ad Hoc Network for Secured Communication and Minimized Power Consumption
Security and reliable communication is challenging task in Mobile Ad-hoc NETwork. Through mobility of network device compromised with attack and loss of data. For the prevention of attack and reliable...
Provided By Academy & Industry Research Collaboration Center
-
Simulation of A Novel Scalable Group Key Management Protocol
Secure and multicast group communication is an active area of research. The main problem in secure group communication is group dynamics and key management. Group key management brings challenges on s...
Provided By International Journal of Computer Applications
-
Correlation Based Fingerprint Image Segmentation
In this paper, a correlation based fingerprint image segmentation technique is presented. Segmented is a useful image processing tool generally used in machine vision applications in the pattern recog...
Provided By International Journal of Computer Applications
-
ElGamel Encryption for Biometric Database Protection
The critical issues in biometric systems are protecting the template of a user which is stored in a data base. An attack against the stored templates constitutes a major security and privacy threat in...
Provided By International Journal of Computer Applications
-
A Formal Attack Centric Framework Highlighting Expected Losses of an Information Security Breach
From the beginning of the different approaches for analyzing and assessing the information related risk affecting organization, the two factors deriving risk are the damages or losses incurred to the ...
Provided By International Journal of Computer Applications
-
Retrospect of Machine Learning Techniques for Designing Secure System
Security is the latest research which is of essential concern for many researchers. As the data is generated every second both in host and network so it's necessary to ensure the preservation of their...
Provided By International Journal of Computer Applications
-
Four Way Encryption Method for Secure Message Coding by Use of CBC, Merkle-Hellman, Randomizers and Discrete Logarithmics
The Cipher Block Chaining (CBC) and the Merkle-Hellman algorithm are two different cryptosystems for encrypting messages. But using these cryptosystems separately has many drawbacks. However, there ar...
Provided By International Journal of Computer Applications
-
Intrusion Detection System with Multi Layer Using Bayesian Networks
In the era of network security, Intrusion Detection System plays a vital to detect real-time intrusions, and to execute work to stop the attack. Being everything shifting to internet, security became ...
Provided By International Journal of Computer Applications
-
A Novel Symmetric Key Cryptographic Technique at Bit Level Based on Spiral Matrix Concept
In this paper, the authors propose a session based bit level symmetric key cryptographic technique and it is termed as Spiral Matrix Based Bit Orientation Technique (SMBBOT). SMBBOT consider the input...
Provided By Kalyani University
-
A Study on Network Security Aspects and Attacking Methods
Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security all...
Provided By Creative Commons
-
Speech Authentication Based on Perceptual Fingerprint Hashing
A perceptual fingerprint hashing method is proposed for audio authentication in this paper. First, the biologic fingerprint image is divided into overlapping rectangle blocks by randomly using a chaot...
Provided By Journal of Theoretical and Applied Information Technology
-
Network Intrusion Prevention System Techniques to Manage DDOS Attacks
Now-a-days, guarantee of secure communication is as important as the traditional computer and information security assurance. Presently Distributed Denial of Service (DDoS) Attacks are causing billion...
Provided By Universal Insurance Managers, Inc.
-
Data Leakage Detection Using Encrypted Fake Objects
Data leakage is a budding security threat to organizations, particularly when data leakage is carried out by trusted agents. In this paper, the authors present unobtrusive techniques for detecting dat...
Provided By K L University
-
How Compliance Impacts Backup Strategy
There's nothing more important than compliance for a business, and yet there are also few things harder to manage. Backup and recovery has recently become a huge area of concern for IT as well, so th...
Provided By Idera
-
Simple, cost-effective messaging and collaboration for medium-sized businesses
Help strengthen customer relationships, drive operational effectiveness and optimize your workforce with IBM collaboration and messaging solutions for medium-sized businesses. IBM Lotus software is de...
Provided By IBM
-
Taking Your Enterprise Mobile: The Executive Checklist
According to nearly every analyst study, security is the primary inhibitor to both enterprise mobility and bring-your-own-device (BYOD) programs, and 17% of enterprises have already experienced a mobi...
Provided By Citrix
-
Comparative Analysis of Voting Schemes for Ensemble-Based Malware Detection
Malicious software (malware) represents a threat to the security and the privacy of computer users. Traditional signature-based and heuristic-based methods are inadequate for detecting some forms of m...
Provided By Blekinge Institute of Technology
-
E-LPG: Energy Efficient Location Privacy Scheme Against Global Attackers in Sensor Networks
Many sensor network security schemes protect the content of messages, while the contextual information is left vulnerable by disclosing the location of the monitored objects. Preserving location priva...
Provided By Texas A&M International University
-
A Hybrid Security Model for Mobile Agents in Distributed Systems
This paper focuses on the development of a hybrid security model for Mobile Agents (MAs) system in a distributed network environment using RSA and DSA. The MA computing vulnerabilities include authent...
Provided By University of Utah EAE Master Games Studio Program
-
A Prudent Approach to Next-Generation Network Security
In this period of new security requirements and rapid innovation, CISOs need a much more pragmatic strategy for security infrastructure planning and product selection. ESG’s independent industry ana...
Provided By AU: McAfee
-
McAfee Explains how to Neutralise Advanced Malware
Today's malware is a malleable tool in the hands of a clever cybercriminal who uses it to attack through vulnerabilities that standard antivirus solutions don't monitor or aren't designed to catch. ...
Provided By AU: McAfee
-
Securing a Space-Based Service Architecture With Coordination-Driven Access Control
In distributed applications, multiple autonomous processes need to collaborate in an efficient way. Space-based middleware enables data-driven coordination for these processes via shared tuple spaces ...
Provided By Vienna University of Economics and Business
-
Algorithm for Efficient Attendance Management: Face Recognition Based Approach
Students attendance in the classroom is very important task and if taken manually wastes a lot of time. There are many automatic methods available for this purpose, i.e., biometric attendance. All the...
Provided By International Journal of Computer Science Issues
-
Hiding Data in Images Using New Random Technique
Steganography is the art of hiding the fact that communication is taking place by hiding information in other information. In the field of Data Communication, Steganography play a major role. The tran...
Provided By International Journal of Computer Science Issues
-
Feature Level Fusion of Palmprint and Iris
In many real-life usages, single modal biometric systems repeatedly face significant restrictions due to noise in sensed data, spoof attacks, data quality, non-universality, and other factors. However...
Provided By International Journal of Computer Science Issues
-
Emergence of Robust Information Security Management Structure Around the World Wide Higher Education Institutions: A Multifaceted Security Solution
Polarizing the views on the emergence of Information security around the campus arenas of higher education institutions is the utmost erg of both developing and developed nations in this post catastro...
Provided By International Journal of Computer Science Issues
-
A Goal Question Metric Approach for Evaluating Security in a Service Oriented Architecture Context
For interactions to be possible within the Service Oriented Architecture (SOA) ecosystem, each actor must be enough confident of other actors to engage safely in the interactions. Therefore, the estab...
Provided By International Journal of Computer Science Issues
-
A Primary User Authentication Scheme for Secure Cognitive TV Spectrum Sharing
Cognitive radio is being intensively investigated by regulatory bodies as the enabling technology for opportunistic access to the TV white spaces. The successful deployment of cognitive radio networks...
Provided By International Journal of Computer Science Issues
-
A Novel Protocol for IP Traceback to Detect DDoS Attack
Distributed Denial of Service (DDoS) attacks continue to pose higher threats to the internet. There are so many protocols designed to trace the attacker's address. The authors want to trace back attac...
Provided By International Journal of Computer Science Issues
-
Testing Websites by P3R2 Model
Cyber espionage at the government, corporate and individual levels has increased dramatically over the last few years. The cyberspace has become the latest domain of Chinese belligerence. There is a c...
Provided By International Journal of Computer Science Issues
-
Network Based Anti-Virus Technology for Real-Time Scanning
Negative aspects of networking lately became one of the most crucial problems in the information world. Protection against malware and malicious code must balance between being capable of fast detecti...
Provided By International Journal of Computer Science Issues
-
Formalized Security Model of Identity-Based Multi-Proxy Signature
Multi-proxy signature is an extension of the primitive basic proxy signature. In a multi-proxy signature scheme, an original signer could delegate his signing rights to a group of proxy signers. And o...
Provided By International Journal of Computer Science Issues
-
New Non Path Metrics for Evaluating Network Security Based on Vulnerability
In this paper, the authors propose a new and simple metrics for evaluating network security. The proposed metrics are based on the existence of network vulnerabilities in the network. The proposed met...
Provided By International Journal of Computer Science Issues
-
Cryptanalysis of a Public-Key Cryptosystem Using Lattice Basis Reduction Algorithm
The authors considered cryptanalysis of a knapsack-type public key cryptosystem. This cryptosystem uses a combination permutation algorithm in the encryption phase to avoid the low density attack by k...
Provided By International Journal of Computer Science Issues
-
A Lossless Data Hiding Technique Based on AES-DWT
In this paper, the authors propose a new data hiding technique. The new technique uses steganography and cryptography on images with a size of 256x256 pixels and an 8-bit grayscale format. There are d...
Provided By International Journal of Computer Science Issues
-
Study of Face Recognition Approach Based on Similarity Measures
Detecting the similarity of face image aims to determine the image of a face for verification purpose of documents such as passport, driving license, ID cards, etc. Similarity measures are essential t...
Provided By International Journal of Computer Science Issues
-
Internet Intrusion Detection System Service in a Cloud
Intrusion Detection Systems (IDS) have been used widely to detect malicious behaviors in network communication and hosts. It is defined as a computer network system to collect information on a number ...
Provided By International Journal of Computer Science Issues
-
Enhanced ATM Security System Using Biometrics
Because biometrics-based authentication offers several advantages over other authentication methods, there has been a significant surge in the use of biometrics for user authentication in recent years...
Provided By International Journal of Computer Science Issues
-
A Trust-Based Security Mechanism for Nomadic Users in Pervasive Systems
The emergence of network technologies and the appearance of new varied applications in terms of services and resources, have created new security problems for which existing solutions and mechanisms a...
Provided By International Journal of Computer Science Issues
-
Speedy Signature Based Intrusion Detection System Using Finite State Machine and Hashing Techniques
This paper proposes a secure system designs for client-server based communication systems. In this system, security services are implemented on server, as generally data received on the servers contai...
Provided By International Journal of Computer Science Issues
-
Prevention of Attacks Under DDoS Using Target Customer Behavior
The possibility of sharing information through networking has been growing in geometrical progression. In this connection it is to be noted network attacks, in other words, DDoS attacks also are growi...
Provided By International Journal of Computer Science Issues
-
Design and Implementation of Multitier Authentication Scheme in Cloud
The purpose of this paper is to present the design of a secure and more advanced authentication scheme for executing secure financial transactions over Internet. There has been continuous change in te...
Provided By International Journal of Computer Science Issues
-
New Capabilities of Visual Cryptography
Visual Cryptography Schemes (VCS) consider the problem of encrypting and sharing images (printed text, hand written notes, pictures, etc.) in a perfectly secure way which can be decrypted directly by ...
Provided By International Journal of Computer Science Issues
-
Credit Card Fraud Detection Using Decision Tree for Tracing Email and IP
Credit card fraud is a wide-ranging term for theft and fraud committed using a credit card or any similar payment mechanism as a fraudulent source of funds in a transaction. The purpose may be to obta...
Provided By International Journal of Computer Science Issues
-
Design and Implementation of an IP-Based Security Surveillance System
The tremendous loss of lives and properties that may be attributed to criminals in recent times worldwide has become a source of worry to all and sundry. The situation has come to the alarming rate th...
Provided By International Journal of Computer Science Issues
-
Quantum Fourier Sampling, Code Equivalence, and the Quantum Security of the McEliece and Sidelnikov Cryptosystems
The Code Equivalence problem is that of determining whether two given linear codes are equivalent to each other up to a permutation of the coordinates. This problem has a direct reduction to a non abe...
Provided By University of New Haven
-
A Novel in E-Voting in Egypt
Election is a fundamental instrument of democracy that provides an official mechanism for people to convey their views to their government by democratic means. E-voting becomes the most important appl...
Provided By Royal Institute of British Architects
-
Efficient Digital Image Authentication and Tamper Localization Technique Using 3Lsb Watermarking
The authentications of digital images have become the center of attentions for certain group of companies since the number of doctored images increased. Tampering the digital images in a way that it's...
Provided By International Journal of Computer Science Issues
-
Robust Iris Recognition Based on Statistical Properties of Walsh Hadamard Transform Domain
In this paper, a new approach of iris image feature extraction technique based on the statistical properties of Walsh Hadamard Transform (WHT) domain is proposed. A Canny Edge Detection followed by Ho...
Provided By International Journal of Computer Science Issues
-
A Conventional Authentication in Key Management Using Progressive Approach
Secure and reliable group communication is an increasingly active research area prompted by the growing popularity of many types of group-oriented applications. The main building block to achieve secu...
Provided By International Journal of Computer Science Issues
-
Serious Security Weakness in RSA Cryptosystem
Nowadays, RSA is the well-known cryptosystem which supports most of electronic commercial communications. RSA is working on the base of multiplication of two prime numbers. Currently different kinds o...
Provided By International Journal of Computer Science Issues
-
Privacy Preserving RFE-SVM for Distributed Gene Selection
The Support Vector Machine Recursive Feature Elimination (SVMRFE) is one of the most effective feature selection methods which has been successfully used in selecting informative genes for cancer clas...
Provided By International Journal of Computer Science Issues
-
Human Iris Segmentation for Iris Recognition in Unconstrained Environments
This paper presents a human iris recognition system in unconstrained environments in which an effective method is proposed for localization of iris inner and outer boundaries. In this method, after pr...
Provided By International Journal of Computer Science Issues
-
Using Jquery With Snort to Visualize Intrusion
The explosive growth of malicious activities on worldwide communication networks, such as the Internet, has highlighted the need for efficient intrusion detection systems. The efficiency of traditiona...
Provided By International Journal of Computer Science Issues
-
Network Threat Ratings in Conventional DREAD Model Using Fuzzy Logic
One of the most popular techniques to deal with ever growing risks associated with security threats is DREAD model. It is used for rating risk of network threats identified in the abuser stories. In t...
Provided By International Journal of Computer Science Issues
-
Proposal of a New Block Cipher Reasonably Non- Vulnerable Against Cryptanalytic Attacks
This paper proposes a new block cipher termed as "Modular Arithmetic based Block Cipher with Varying Key-Spaces (MABCVK)" that uses private key-spaces of varying lengths to encrypt data files. There i...
Provided By International Journal of Computer Science Issues
-
Semantic Malware Detection by Deploying Graph Mining
Today, malware is a serious threat to the people society. Several researchers are studying detection and mitigation of malware threats. On the other hand malware authors try to use obfuscation techniq...
Provided By International Journal of Computer Science Issues
-
Hybrid DCT-DWT Watermarking and IDEA Encryption of Internet Contents
Encryption and watermarking are complementary lines of defense in protecting multimedia content. Recent watermarking techniques have therefore been developed independent from encryption techniques. In...
Provided By International Journal of Computer Science Issues
-
A Novel Chaotic Encryption Scheme Based on Pseudorandom Bit Padding
Cryptography is always very important in data origin authentications, entity authentication, data integrity and confidentiality. In recent years, a variety of chaotic cryptographic schemes have been p...
Provided By International Journal of Computer Science Issues
-
Implementation of Elliptical Curve Cryptography
This paper involves the development of the Elliptical Curve Cryptography (ECC) for file formats like audio, video and Image. It is also used for the compression of same file formats. The tools are pro...
Provided By International Journal of Computer Science Issues
-
A Novel Approach for Intrusion Detection
Research in the field of computer and network science demands for tools and methodology to test their security effectively. Intrusion Detection System is used to perform the same with a fact that an i...
Provided By International Journal of Computer Science Issues
-
Packet Filtering Using IP Tables in Linux
Firewalls are core elements in network security. However, managing firewall rules, especially for enterprise networks, has become complex and error-prone. Firewall filtering rules have to be carefully...
Provided By International Journal of Computer Science Issues