Network Security

This category consists of Network Security list, latest IEEE Papers on Network Security

    1. Agent-Based, Peer-to-Peer Mobile Application
    2. Abstract:
      Mobile Search is becoming increasingly important for mobile users as mobile devices are more widely used. Mobile search differs from standard PC-based search in a number of ways: (1) The user interfaces and I/O are limited by screen real estate and tiny key pads are tiny, (2) increased local search due to mobility. These limitations result in more navigational queries in the mobile search. In this we will have two devices and we will be able to search from one device the contents of other device. We describe how to develop peer-to-peer and social applications for the ANDROID SDK, the new mobile platform delivered by Google within the Open Handset Alliance at November 2007. In particular we focus on using JADE, a popular open source framework that facilitates the development of interoperable intelligent multi-agent systems. In our opinion JADE, thanks to the expressiveness of its communication model, brings strong added value to ANDROID SDK platform in the development of innovative applications based on social models and peer-to-peer paradigm.

    3. Authentication Scheme for session passwords using colors and images
    4. Abstract:
      Textual passwords are the most common method used for authentication. But textual passwords are vulnerable to eves dropping, dictionary attacks, social engineering and shoulder surfing. Graphical passwords are introduced as alternative techniques to textual passwords. Most of the graphical schemes are vulnerable to shoulder surfing. To address this problem, text can be combined with images or colors to generate session passwords for authentication. Session passwords can be used only once and every time a new password is generated. In this paper, two techniques are proposed to generate session passwords using text and colors which are resistant to shoulder surfing.

    5. Data Security Using Armstrong numbers and colors
    6. Abstract:
      In today's world data security during transmission is very important. Data Security refers to the protection of data from unauthorized users in a way such that confidentiality, authentication, integrity, non repudiation are given importance. This can be achieved by using cryptography. This paper provides a technique to encrypt the data using a key involving Armstrong numbers and colors as the password. The key is passed between the sender and the receiver by using Diffie-Hellman key exchange algorithm. A set of Keys are used to provide secure data transmission via social transfer media like FTP, email etc.

    7. Phish Mail Guard Phishing Mail Detection Technique by using Textual and URL Analysis
    8. Abstract:
      Phishing is a criminal scheme to steal the user's personal data and other credential information. It is a fraud that acquires victim's confidential information such as password, bank account detail, credit card number, financial username and password etc. and later it can be misuse by attacker. We proposed a new anti-phishing algorithm, which we call ObURL Detection Algorithm. The ObURL Detection Algorithm used to detect the URL Obfuscation Phishing attacks and it provides the multilayer security over the internet fraud. The ObURL Detection Algorithm can detect the hyperlink, content of hyperlink's destination URL, iFrame in email, input form, input form in iFrame source URL, iFrame within iFrame, and after all that multiple tests will be perform such as DNS Test, IP address Test, URL Encode Test, Shorten URL Test, Black and White list Test, URL pattern matching Test On that collected data. ObURL Detection Algorithm is effective to detect both known and unknown URL Obfuscation phishing attacks.

    9. Textual-Formula Based password Authentication System
    10. Abstract:
      The most common computer authentication method is to use alpha numeric user name and password. This method has been shown to have significant drawbacks. User tends to pick short password that can be easily guessed. On the other hand, if password is hard to guess, then it is often hard to remember. The vulnerabilities of textual password are well known. Users tend to pick short password or password that is easy to remember which makes password vulnerable for attackers to break. In this paper, we propose a scalable shoulder surfing resistant textual-formula base password authentication system (S3TFP AS). S3TFP AS seamlessly integrates the textual password and formula to create the strong random password. We argue that S3TFPAS will allow more secure and complex authentication with a lower cognitive load. It will provide a strong resistant against shoulder surfing, brute force attack, hidden cam and dictionary attack through dynamic password.

Technowings Pune | IEEE Network Security List | Final Year Project List | Latest IEEE Papers | IEEE Papers in Mobile Computing

Call us : 09766750000 / 09860923474
Mail ID :