Skip to main content

Data and Network Security Related Research Papers

data and network security related research papers


Phishing Attack Detection Using Enhanced Classification Method

Abstract:
Phishing attack is major issue. The attacker steals the information from the users machine or insert a malware in that system. When the users are attracted to visit the web page the script is executed to carried out the its task. To detect and prevent these attack various tools and methods are developed. Various phishing detection techniques are proposed. But the phishing attacks are not completely detected because the attacker dynamically changing their approaches. In this paper we propose a dynamic approach which solution to any type of phishing attack. Our idea is to analyze the static and dynamic features of the web page to differentiate phishing and genuine web page using machine learning algorithms. The proposed approach correctly detects all phishing and genuine website without any false positive and negatives. It overcomes many drawback of the existing signature based approaches.

Keywords: Phishing, Web, Malware, Detection

URL : http://irejournals.com/formatedpaper/1700906.pdf

Using Two Level QR Code System For Providing Security To Important Data

Abstract:
The Quick Response (QR) codes are optics labels which are machine readable. User can create QR either dynamic or static QR by using Code Generator and download them for immediate use. QR code is use to store the data on to that. QR codes are the way to provide a linking between the Internet and real world products and. QR codes make it so easy to transfer a web link to a mobile. There is a new rich QR code use for data security, that has two storage levels. That QR code called two level QR code because it is having two parts. One part is for public data and it is generated by standard process. It can be reads by any application which is standard QR code reader. The second part of QR code is private data and it will generates using texture patterns. These patterns are replaces the black modules of the QR code. Because of using texture patterns, there will be increase capacity of the QR code to store the data as well as user can be check the actual document with the copied documents. Recognizing the patterns is method that can be use to scan the second part of the QR code. It is also use both in shares the private data and to provide the security for data. The capacity QR code is to store the data can be increase by increasing the size of texture pattern .

Keywords: Quick response code, Data security, Print and Scan, Golay algorithm

Mitigating Cross Site Scripting Attacks With A Content Security Policy 

Abstract:
A content security policy (CSP) can help Web application developers and server administrators better control website content and avoid vulnerabilities to cross-site scripting (XSS). In experiments with a prototype website, the authors' CSP implementation successfully mitigated all XSS attack types in four popular browsers. An XSS attack involves injecting malicious script into a trusted website that executes on a visitor?s browser without the visitor?s knowledge and thereby enables the attacker to access sensitive user data, such as session tokens and cookies stored on the browser.1 With this data, attackers can execute several malicious acts, including identity theft, key logging, phishing, user impersonation, and webcam activation.

Keywords: Content Security Policy, Cross Site Scripting, Web Applications, Input Sanitizers, Mitigating, Vulnerabilities


Data Analytics And Security In Cloud

Abstract:
The advent of the digital age has led to a rise in different types of data with every passing day. This data is complex and needs to be stored, processed and analyzed for information that can be used by organizations. Cloud computing provides an apt platform for big data analytics in view of the storage and computing requirements of the latter. We discuss various possible solutions for the issues in cloud computing security and Hadoop. Big data analytics use complex data mining algorithm that require efficient high performance processors. Cloud computing infrastructure is able to provide both computational and data processing applications and also offers elasticity, pay-per- user, low affordable investment. Challenges in data migration on cloud are scalable data management, application security, Map reduce & Hadoop environment.

Keywords: Big Data, Cloud Computing, Kerberos, Altryx


Security For Short Message Peer-To-Peer Protocol

Abstract:
Short Message Service (SMS) has become an extension of our lives and plays an important role in daily chores. SMS is a popular medium for delivering Value Added Services and are suitable for mobile banking, payment reminders, SOS calls, stock and news alerts, railway and flight enquiries etc. These types of messages are normally computer generated messages sent over Short Message Peer-to- Peer (SMPP) protocol. SMPP is an application layer protocol to send messages over TCP/IP connection. The Short Message Peer-to- Peer (SMPP) protocol is a telecommunications industry protocol for exchanging SMS messages between SMS peer entities such as short message service centers and/or External Short Messaging Entities. SMPP protocol has no security measures specified which allows fast delivery of SMS messages in bulk. Compromised messages or loss of messages can cause lot of revenue loss and fatal consequences. A secure SMPP protocol is proposed and implemented by introducing Transport Layer Security (TLS) with SMPP protocol specifications. A client tool is developed to securely connect to the server. Secure Short Message Peer-to- Peer protocol will enhance the security of fast growing messaging and telecommunication world.



Popular Posts

Articles, Research, & Case Studies on Management Studies

Articles, Research, & Case Studies on Management A Study on Intellectual Property Rights (IPR) For Micro, Small And Medium Enterprises In India By Dr. Nalla Bala Kalyan  Abstract: Intellectual property is a rising out of one's idea, thoughts and intellectual influence. Today, the government and law makers, identifying its power and wide operation, gave it legal protection in terms of patents, trademarks, copyrights, industrial designs and geographical indications. IP can assist MSMEs grow worldwide as big as their competitors in all aspects of their business. IP will assist MSMEs to develop their industry and aggressive management policy. The small scale sector has played a greater role in the socio economic development of the country during the past fifty years. The MSMEs are of immense strategic importance to the Indian Economy because of its their contribution in terms of output, export, employment, flexibility, competitiveness, innovation, offering economical s

Top Universities Ranking In India 2018

Top Universities Ranking In India  2018 The National Institutional Ranking Framework (NIRF) has been accepted by the Ministry of Human Resource Development (MHRD) Government of India. This framework outlines a methodology or define a process to rank institutions across the country. The process of ranking based on the overall recommendations broad understanding arrived at by a Core Committee set up by MHRD, to identify the broad parameters for ranking various universities and institutions. The parameters broadly cover “Teaching, Learning and Resources,” “Research and Professional Practices,” “Graduation Outcomes,” “Outreach and Inclusivity,” and “Perception”. Here we list out the overall top 10 ranking universities of India. NIRF list the university ranking for engineering, university ranking of pharmacy, university ranking for medical, university ranking for management, university ranking for architecture, university ranking for Law and many more. Top 10 University Ranking

The influence of open access on research citation rates.

In recent years, the open access movement has gained significant momentum, with researchers seeking ways to increase the visibility and impact of their work. Open access refers to the practice of making research articles freely available online, allowing anyone with an internet connection to access and read them. One of the key benefits of open access is its impact on research citation rates. Studies have consistently shown that open-access articles are more likely to be cited than articles behind paywalls. This is because open-access articles are more accessible and visible, allowing a wider audience to discover and cite them. In addition, many open-access repositories and journals use metrics and analytics to track the impact of research, which can help to increase its visibility and impact. Another factor that contributes to the higher citation rates of open-access articles is the increased collaboration and cross-disciplinary exchange that open access enables. By making research fr