Cryptographic Provenance Verification for Secure Hosts

Download Now
Provided by: International Journal of Scientific & Engineering Research
Topic: Security
Format: PDF
To improve the trustworthiness of a host and system data cryptographic verification technique is used. From these approach users keystroke to identify the legitimate user's to get the service from the server by using integrity verification and malicious traffic detection. But the main issue of this approach is keystroke hacking by the bots or autonomous program. The key logger's records the user's password or security code and send to the hacker to login the service when the user is no longer online. This paper aims to propose a malware detection approach based on the characteristic behavior of human user's.
Download Now

Find By Topic