Security
What's worse than getting hit with a security breach? Getting hit with an easily preventable one.
-
HDL Implementation of Algebraic Soft Decision Algorithm for RS Codes
Reed Solomon (RS) codes are widely used to detect and correct data errors in transmission and storage systems. Hence it is used in many digital communication and storage devices. In existing system Re...
Provided By Creative Commons
-
Detecting and Resolving Firewall Policy Anomalies Using Rule-Based Segmentation
In this paper, the authors present an anomaly management framework for firewalls based on a rule-based segmentation technique to facilitate not only more accurate anomaly detection but also effective ...
Provided By Creative Commons
-
Remote System Controller: An Implementation of a Secure Channel
Now-a-day's security over a network is a must. Everyone wants to share files with others like Facebook, Pinterest. But are they aware whether the network on which they are Sharing files is Secure? So ...
Provided By Creative Commons
-
Adapted Encryption Algorithm With Multiple Skew Tent Map
In recent years, the chaos based cryptographic algorithms have some optional and efficient ways to develop secure encryption techniques. In this paper, the authors proposed a modified approach for enc...
Provided By Creative Commons
-
High Imperceptible Encoding for Computer Networks Security
Today, computer and network technologies provide easy-to-use communication channels for steganography. In most algorithm used to secure information both steganography and cryptography are used togethe...
Provided By Creative Commons
-
Authenticating Mobile Device Users Through Image Selection
Adequate user authentication is a persistent problem, particularly with mobile devices such as Personal Digital Assistants (PDAs), which tend to be highly personal and at the fringes of an organizatio...
Provided By Creative Commons
-
Robust Watermarking Scheme Against Geometerical Attacks
In the age of e-media where everything is accessed through the internet it becomes very important to protect the privacy and the copyright of the data and the information which is shared through the i...
Provided By Creative Commons
-
IP Trace Back Scheme for Packet Marking and Packet Logging Using RIHT
Internet protocol trace back is the enabling technology to control the crime. Internet protocol packet is to find the real source of Internet attacks, the authors must possess the capability of discov...
Provided By Creative Commons
-
Policy Management in Adhoc Networks
Policy-based management is based on defining a set of global rules, according to which a network or distributed system must operate. In the last few years, policy-based management has begun to emerge ...
Provided By Creative Commons
-
Honeypots for Network Security
A honeypot is used in the area of computer and Internet security. It is a resource, which is intended to be attacked and computerized to gain more information about the attacker, and used tools. One g...
Provided By Creative Commons
-
Communication and Implementation of Plug and Play Enabled Devices in Sensor Network
Most of sensor networks are static in nature and do not provide standardized and systematic network management capabilities. Intelligence is not associated with the sensors. In order to make a sensor ...
Provided By Creative Commons
-
Firecol: The Detection of Flooding DDoS Attacks in Network
In this paper, the authors administer on the problem of DDoS attacks and present the speculative foundation, architecture, of FireCol. The center of FireCol is nonchalant of Intrusion Prevention Syste...
Provided By Creative Commons
-
Technology and approach for providing real-time, comprehensive protection for all types of databases.
Every database, from the largest corporate data store to a small-scale MySQL deployment, contains valuable information. Hackers remain as determined as ever in their efforts to cash in on this treasur...
Provided By McAfee
-
Database Security in Virtualization and Cloud Computing Environments
Many organizations have found themselves drawn to virtualization and cloud computing architectures for the many benefits, only to find that the complexity of ensuring adequate data security was simply...
Provided By McAfee
-
A Practical Guide to Database Compliance
Compliance does not automatically equate to security. Why is database security so important? For a company that has suffered a serious data breach, it boils down to monetary and reputation damage in m...
Provided By McAfee
-
Mutation Analysis for Security
Security has become, now-a-days, a major concern for the organizations as the majority of its applications are exposed to Internet, which increases the threats of security considerably. Thus, the solu...
Provided By University Mohammed V Souissi
-
A New Ecology Model for Internet Worm Security Threat Evaluation
Welchia worms were launched to terminate the Blaster worms and patch the vulnerable hosts. They created complex worm interactions as well as detrimental impact on infrastructure. Worm propagation anal...
Provided By Science and Development Network (SciDev.Net)
-
Tech Tips: VMware vSphere Data Protection
Straight from our experts at VMware®, follow these technical tips for a successful and smooth implementation of VMware vSphere® Data Protection™. From retention policies to best practices for deployin...
Provided By VMware
-
Session Passwords Using Grids and Colors for Web Applications and PDA
Textual passwords are the most common method used for authentication. But textual passwords are vulnerable to eves dropping, dictionary attacks, social engineering and shoulder surfing. Graphical pass...
Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)
-
Improving Authentication Mechanism for using Extended Public Key Cryptography in Mobile Adhoc Network
Mobile Ad-hoc NETwork is a special kind of wireless networks formed without any centralized administration. It is a collection of mobile nodes without having aid of establish infrastructure. In Mobile...
Provided By International Journal of Advanced Research in Computer Engineering & Technology
-
Remote Monitoring, Controlling and Lost Hardware Detecting through GSM
In this paper, the authors aim is to develop various network utilities which are required to effectively monitor control via GSM and to provide security to a LAN network. It aims to develop an integra...
Provided By International Journal of Advanced Research in Computer Engineering & Technology
-
Spectrum of Cyber Threats & Available Control Mechanisms
The Internet is undoubtedly the largest public data network enabling and facilitating both personal & business communications worldwide. Wireless networking has experienced a tremendous growth becomin...
Provided By International Journal of Advanced Research in Computer Engineering & Technology
-
A Survey on Prevention of Black Hole Attack in an Ad-Hoc Network
An ad-hoc network is a group of wireless and mobile nodes that function without any open infrastructure and has the capability to form a temporary network dynamically. Ad-hoc On-demand Distance Vector...
Provided By International Journal of Advanced Research in Computer Engineering & Technology
-
An Overview & Analysis Safety Proposal And Policies Of Internet Network Safety
Now-a-days network safety is very crucial and protected opinion, to determine virus. The review of the process of network safety policies to the private network connected to the internet & information...
Provided By International Journal of Advanced Research in Computer Engineering & Technology
-
A Study Of Different Attacks In Manet And Discussion About Solutions Of Black Hole Attack On Aodv Protocol
MANETs are gaining popularity now days due to flexibility and communication without the infrastructure or centralized access point. The dynamic changing nature of network topology makes any node in MA...
Provided By International Journal of Advanced Research in Computer Engineering & Technology
-
Blackhole Attack and Detection Method for AODV Routing Protocol in MANETs
Causing packet loss due to attacks by malicious nodes is one of the most important problems in MANETs. There are many ways by which packet loss can occur in MANETs such as broken links, transmission e...
Provided By International Journal of Advanced Research in Computer Engineering & Technology
-
A Design of an Efficient, Robust, Autonomous and a Well Coordinated Distributed Network Monitory System for Large Computer Networks
Information security assurance over networks is one of the key major issues facing the network infrastructure of organizations and information systems in today's world. Data security and access contro...
Provided By International Journal of Advanced Research in Computer Engineering & Technology
-
Data Security Leaks
Computer security is an often overlooked aspect of staff training. As a result, sensitive data is at risk of theft and loss. As a worst case scenario, companies have dealt with complete data loss, una...
Provided By Backupserver
-
Malware Classification Through HEX Conversion and Mining
The malicious codes are normally referred as malware. Systems are vulnerable to the traditional attacks, and attackers continue to find new ways around existing protection mechanisms in order to execu...
Provided By IRJCSEA
-
User Profile Base Email Filter for Spam Mail
E-mail is probably the most convenient method of transferring messages electronically from one person to another, emerging from and going to any part of the world. Important features of E-mail such as...
Provided By IRJCSEA
-
SQL Injection Attacks and Prevention Techniques
SQL injection attacks are a serious security threat to Web applications. They allow attackers to obtain unrestricted access to the databases underlying the applications and to the potentially sensitiv...
Provided By Auricle Technologies
-
Crossbreed Advanced Security Against Pishing and Spoofing
Phishing /Pharming/Web Spoofing attacks are widely used to gather user personal information, including usernames and passwords. One possible scenario for such an attack arises when an attacker creates...
Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)
-
ARM-7 Based Finger Print Authentication System
A fingerprint is an impression of the friction ridges found on the inner surface of a finger or a thumb. Personal Safes are revolutionary locking storage cases that open with just the touch of their f...
Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)
-
Privacy Preserving K-Means Clustering on Horizontally Distributed Data
Privacy Preserving Data mining (PPDM) is the combination of information security technology and knowledge discovery technology. The aim of Privacy preserving data mining is the extraction of relevant ...
Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)
-
Enhanced OpenID Protocol in Identity Management
Identity management is the process by which user identities are defined and managed in enterprise environment. Identity Management (IdM) describes the management of individual identifiers, their authe...
Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)
-
Association Rule Based Data Mining Approach to HTTP Botnet Detection
Botnet is most dangerous and widespread among all threats in today's cyber world. It is basically group of compromised computers connected via internet, mostly the vulnerable hosts, are remotely acces...
Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)
-
A Brief Comparison of Security Patterns for Peer to Peer Systems
The peer-to-peer networks are depends on securely distributing the identities. So P2P networks are vulnerable to attacks against identities which include Eclipse Attack, Sybil Attack, etc. In the defe...
Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)
-
VLSI Implementation of Advanced Encryption Standard Using Rijndael Algorithm
Now-a-days Advanced Encryption Standard (AES) is the most efficient public key encryption system based on Rijndael Algorithm that can be used to create faster and efficient cryptographic keys. AES gen...
Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)
-
A Proposed Method of Information Hiding Based on Hybrid Cryptography and Steganography
Combination of cryptography and Steganography for secure communication is an application, which combines both Cryptography methods (i.e. encryption and decryption) and Steganography techniques to make...
Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)
-
Deploying Cryptography in Domain Name System: An Overview
The Domain Name System (DNS) has become a critical operational part of the Internet Infrastructure, yet it has no strong security mechanisms to assure Data Integrity or Authentication. Extensions to t...
Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)
-
Intelligent Defense against Malicious JavaScript Code
JavaScript is a popular scripting language for creating dynamic and interactive web pages. Unfortunately, JavaScript also provides the ground for web-based attacks that exploit vulnerabilities in web ...
Provided By University of Göttingen
-
Performance Analysis of Encryption Algorithms' Text Length Size on Web Browsers
Information can easily be acquired over the Internet, as the authors know it today. Some are meant to be visible, while others are considered to be sensitive and meant to be secretive. This however, b...
Provided By Universiti Malaysia Perlis
-
A New Message-Recovery-Combined Fair Blind Signature Scheme with Provable Security Using Self-Certified Pairing-Based Cryptosystem
The fair blind signature scheme indeed plays significant roles in a wide variety of e-commerce and network applications; for example, it can withstand the misapplication of financial crime in electron...
Provided By Da-Yeh University
-
Geometrical Approach for Face Detection and Recognition
A method for face detection and recognition using geometrical relationships of faces is presented in this paper. A gray level of image which is thresholded to produce a binary, edged image is required...
Provided By Minufiya University
-
Evaluating the Performance of Symmetric Encryption Algorithms
Internet and networks applications are growing very fast, so the needs to protect such applications are increased. Encryption algorithms play a main role in information security systems. On the other ...
Provided By Minufiya University
-
Crypto Analysis of Newly Compression Function
Hash functions are functions that map an input of arbitrary length to a string of fixed length, the hashcode. If these mappings satisfy some additional cryptographic conditions, they can be used to pr...
Provided By Oxford Educational Institutions
-
Evaluation on Recent Committed Crypt Analysis Hash Function
This paper describes the study of cryptographic hash functions, one of the most important classes of primitives used in recent techniques in cryptography. The main aim is the development of recent cry...
Provided By Oxford Educational Institutions
-
Performance Evaluation of Symmetric Encryption Algorithms
Internet and networks applications are growing very fast, so the needs to protect such applications are increased. Encryption algorithms play a main role in information security systems. On the other ...
Provided By Minufiya University
-
Intrusion Detection Tools and Techniques - A Survey
Attacks like Denial of Service, Buffer overflows, Sniffer attacks and Application-Layer attacks have become a common issue today. Recent security incidents and analysis have demonstrated that manual r...
Provided By R.V. College of Engineering
-
Information Extraction for Offline Traffic Anomaly Detection in NIDS
This paper discusses an efficient approach for extracting information from the libpcap compatible network data using scripting languages. The extracted information will be used for traffic anomaly det...
Provided By R.V. College of Engineering
-
Agreement Protocol in Cloud Based E-Commerce
Remarkable advancements in Web technologies, network security and monetary transaction systems have modeled Internet as a trusted marketing platform and a commercial tool for e-commerce. Maintaining h...
Provided By Najran University
-
Enhancing Security of Quality Song With Embedding Encrypted Hidden Code in Tolerance Level (SQHTL)
Embedding secret information with song signal may hamper its audible quality as well as originality also would be infringed. Therefore, passing secret code with song signal precisely needs to measure ...
Provided By University of Kalmar
-
SecureSMART: A Security Architecture for BFT Replication Libraries
Several research projects have shown that Byzantine Fault Tolerance (BFT) is practical today in terms of performance. Deficiencies in other aspects might still be an obstacle to a more wide-spread dep...
Provided By University of Paris-Sud 11
-
Object Oriented Modelling of Idea Using GA Based Efficient Key Generation for e-Governance Security (OOMIG)
Nowadays different state and central government in India as well as abroad are taking initiative to deliver different kind of services electronically specially using Information and Communication Tech...
Provided By University of Kalmar
-
Self Authentication of Image Through Daubechies Transform Technique (SADT)
In this paper a 4 x 4 Daubechies transform based authentication technique termed as SADT has been proposed to authenticate gray scale images. The cover image is transformed into the frequency domain u...
Provided By University of Kalmar
-
Self Authentication of Color Image Through Wavelet Transformation Technique (SAWT)
In this paper a self organized legal document/content authentication, copyright protection in composite domain has been proposed without using any external information. Average values of transformed r...
Provided By University of Kalmar
-
Flexible Redactable Signature Schemes for Trees
The redactable signature scheme introduced at VLDB'08 by Kundu and Bertino does not always preserve the structural integrity of the tree signed. In particular, they show how redaction of non-leaves pr...
Provided By University of Paris-Sud 11
-
Authenticity: The Missing Link in the Social Semantic Web
Especially data on Social Network Services (SNS) is linked to online personas. The authors' analysis has shown that no reliably solution for origin authentication is in widespread use. They will show ...
Provided By University of Paris-Sud 11
-
Verifiable and Revocable Expression of Consent to Processing of Aggregated Personal Data
The authors have identified the following three problems for the processing of aggregated personal information with respect to privacy preferences: Unverifiable proof of consent, unverifiable proof of...
Provided By University of Paris-Sud 11
-
Relationship Value In Business Markets: The Customer And Supplier Perspectives In ICT Security Market
Understanding value is a crucial task in business markets. Relationships are not all identical, some of them are more important and profitable than others and this consciousness can guide managers in ...
Provided By Università Cattolica del Sacro Cuore
-
Formal Verification of Privacy for RFID Systems
RFID tags are being widely employed in a variety of applications, ranging from barcode replacement to electronic passports. Their extensive use, however, in combination with their wireless nature, int...
Provided By Eindhoven University of Technology (TU/e)
-
ECC2K-130 on NVIDIA GPUs
A major cryptanalytic computation is currently underway on multiple platforms, including standard CPUs, FPGAs, PlayStations and GPUs, to break the Certicom ECC2K-130 challenge. GPUs are not designed f...
Provided By Eindhoven University of Technology (TU/e)
-
An Analysis of Internet Banking Security of Foreign Subsidiary Banks in Australia: A Customer Perspective
Internet banking has been deployed more frequently over the past few decades to support and improve the operational and managerial performance within the banking industry. However, the security issues...
Provided By International Journal of Computer Science Issues
-
Improving Accuracy of Authentication Process Via Short Free Text Using Bayesian Network
The internet security problems are a crucial threat to all users in the cyber world. One of the important problems about internet security concerned with user classification and authentication. Howeve...
Provided By International Journal of Computer Science Issues
-
Cryptography Based E-Commerce Security: A Review
E-commerce is a powerful tool for business transformation that allows companies to enhance their supply-chain operation, reach new markets, and improve services for customers as well as for providers....
Provided By International Journal of Computer Science Issues
-
Energy Efficient Security Preserving VM Live Migration in Data Centers for Cloud Computing
Virtualization is an innovation that has widely been utilized in modern data centers for cloud computing to realize energy-efficient operations of servers. Virtual Machine (VM) migration brings multip...
Provided By International Journal of Computer Science Issues
-
MVSDAP: A New Extensible, Modifiable and Secure Data Access Pattern for Layered Information Systems
Nowadays, in software architecture especially in agile methodologies dynamicity, extendibility and modifiability are important challenges. In three layered architecture, plenty of patterns are provide...
Provided By International Journal of Computer Science Issues
-
An Improved Authentication Scheme for Passport Verification Using Watermarking Technique
The prominent problem in passport authentication is to authenticate the passport document for its owner. The critical factor of this authentication procedure is to establish a correspondence between P...
Provided By International Journal of Computer Science Issues
-
Fortification of Transport Layer Security Protocol With Hashed Fingerprint Identity Parameter
Identity over the public links becomes quiet complex as Client and Server needs proper access rights with authentication. For determining clients identity with password Secured Shell Protocol or Publi...
Provided By International Journal of Computer Science Issues
-
PCLA: A New Public-Key Cryptosystem Based on Logarithmic Approach
A public key cryptosystem is an asymmetric cryptosystem where the key consist of a public key and a private key. As the public key is public (known to all), can be used to encrypt the messages. The pr...
Provided By International Journal of Computer Science Issues
-
Transmitting Cryptographic Data Through Steganography
Computers are being used worldwide. The internet connects the world as one. Cybercrime is a huge issue which can be resolved by some approaches. In this paper an approach is introduced to ensure the s...
Provided By International Journal of Computer Science Issues
-
An Approach of Digital Image Copyright Protection by Using Watermarking Technology
Digital watermarking system is a paramount for safeguarding valuable resources and information. Digital watermarks are generally imperceptible to the human eye and ear. Digital watermark can be used i...
Provided By International Journal of Computer Science Issues
-
Integration of Chaotic Sequences Uniformly Distributed in a New Image Encryption Algorithm
In this paper, the authors propose a new chaotic secret key cryptosystem, adapted for image encryption in continuous mode, which is based on the use of two one-dimensional discrete chaotic systems: Be...
Provided By International Journal of Computer Science Issues
-
Secure and Compressed Secret Writing Using DES and DEFLATE Algorithm
A new secret writing using DES and DEFLATE algorithm is explored by improving the previous attempts in this sense in terms of security and compression. A Matching Pursuit algorithm using redundant bas...
Provided By International Journal of Computer Science Issues
-
Cryptographic Hash Functions: A Review
Cryptographic Hash functions are used to achieve a number of security objectives. In this paper, the authors bring out the importance of hash functions, its various structures, design techniques, atta...
Provided By International Journal of Computer Science Issues
-
Intrusion Detection System Using Memtic Algorithm Supporting With Genetic and Decision Tree Algorithms
This paper has proposed a technique of combining Decision Tree, Genetic Algorithm, DT-GA and Memtic algorithm to find more accurate models for fitting the behavior of network intrusion detection syste...
Provided By International Journal of Computer Science Issues
-
Network Anomalies Detection Using Statistical Technique : A Chi-Square Approach
Intrusion Detection System is used to detect suspicious activities is one form of defense. However, the sheer size of the network logs makes human log analysis intractable. Furthermore, traditional in...
Provided By International Journal of Computer Science Issues
-
University Authentication System Based on Java Card and Digital X.509 Certificate
This paper presents a solution to the problem of strong authentication, portable and expandable using a combination of Java technology and storage of X.509 digital certificate in Java cards to access ...
Provided By International Journal of Computer Science Issues
-
Modelling Virus Propagation in P2P Networks
Peer-To-Peer (P2P) networking is currently an emerging technology that has gained dramatic increase in popularity both for network traffic and in the research domain. The growing popularity and use of...
Provided By International Journal of Computer Science Issues
-
Analysis of Security Techniques for Detecting Suspicious Activities and Intrusion Detection in Network Traffic
In Computer Network number of security techniques provide security consolation but not up to optimal security extent. There are massive attacks and efficient viruses travel across the network which in...
Provided By International Journal of Computer Science Issues