Packet-Hiding Methods for Preventing Selective Jamming Attacks
This work addresses the problem of selective jamming attacks in wireless networks by developing three schemes that prevent real-time packet classification by combining cryptographic primit ives with physical-layer attributes and demonstrating the security of these methods.
Helping Users Automatically Find and Manage Sensitive, Expendable Files in Cloud Storage
Aletheia’s performance validates a human-centric approach to feature selection when using inference techniques on subjective security-related tasks and improves upon the state of the art in minimizing the attack surface of cloud accounts.
Integrity Checking Using Third Party Auditor in Cloud Storage
- Sutirtha Chakraborty, Shubham Singh, Surmila Thokchom
- Computer ScienceInternational Conference on Contemporary…
- 1 August 2018
The proposed scheme checks the integrity of data stored at remote location through a third party auditor using bilinear pairing and aggregation is applied over the proposed scheme for further optimization.
Public integrity auditing for shared dynamic cloud data
Honeypot Deployment Experience at IIT Kanpur
This chapter provides an idea about honeypots and different types of honeypots, and describes the analysis of the attacks on honeypots deployed at IIT Kanpur.
Secured Cloud Storage using Blockchain Technology
This scheme is the first attempt to formally address the problem of authorized data deduplication and demonstrates that the scheme is secure in terms of the definitions specified in the proposed security model.
Host Based Intrusion Detection System Using Decision Tree and Naïve Bayes Algorithms
This project aims to monitor computer network for malicious activity using Intrusion Detection System (IDS), and aims to use Supervised Machine Learning Algorithms such as Naive Bayes Classifier and Decision Tree Classifiers, and compare their output and efficiency.
Group Data Sharing and Auditing While Securing Sensitive Information
In today’s world, it can be said that cloud computing is a most important research topic nowadays. The reason behind this is the number of services provided by it to its users. Among them, there…
SQL Injection and Areas of Security Concern
- Shubham Singh, Pranju Mishra, Samruddhi Kshirsagar, Shubham Bharadia, Narendra Joshi
- Computer Science
- 30 May 2021
Cyber-crimes are growing rapidly and to prevent these crimes one should share all the knowledge he/she has to make people aware of these attacks. In the field of Application Security there is a very…