Open Access Open Access  Restricted Access Subscription or Fee Access

D-Crush: A stronger approach towards web security

Devendra Kumar

Abstract


In today’s cyber era the term cybercrime is spreading like fire in the forest because we are becoming much more dependent on the cyberspace. The dependency ranges from the birth date of an individual to all the financial details of any organization. Because of this dependency, the cyber space is much more prone to attacks for the various reasons like financial gains, competition, committing crimes etc. It is evident that with time, the number of attacks has been increased by manifold. So, it is the high time to take some action against otherwise it may ruin someone’s life in form of business failure, private information leakage, mal-governance etc. Therefore, it is required to do a detailed study on the cyber-attacks to provide their counter measures. This research paper reviews and provides a solution for a one such problem of cybercrime. The solution deals with the way of data transfer over the web within clients and servers. The main aim of the solution is to give high quality security to the crucial information.

Full Text:

PDF

References


Waxman, Matthew C., Cyber-Attacks and the Use of Force: Back to the Future of Article 2(4) (March 16, 2011). Yale Journal of International Law, Vol. 36, 2011.

Ianelli, Nicholas, and Aaron Hackworth. "Botnets as a vehicle for online crime." FORENSIC COMPUTER SCIENCE IJoFCS (2005): 19

Cooke, Evan, Farnam Jahanian, and Danny McPherson. "The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets." SRUTI 5 (2005): 6-6.

Vogt, Ryan, John Aycock, and Michael J. Jacobson Jr. "Army of Botnets." NDSS. 2007.

Sagiroglu, Seref, and Gurol Canbek. "Keyloggers." IEEE technology and society magazine 28.3 (2009): 10 -17.

Subramanyam, Kishore, Charles E. Frank, and Donald H. Galli. "Keyloggers: The overlooked threat to computer security." 1st Midstates Conference for Undergraduate Research in Computer Science and Mathematics. 2003.

Halfond, William G., Jeremy Viegas, and Alessandro Orso. "A classification of SQL-injection attacks and countermeasures." Proceedings of the IEEE International Symposium on Secure Software Engineering. Vol. 1. IEEE, 2006.

Anley, Chris. "Advanced SQL injection in SQL server applications." (2002).

Spett, Kevin. "Cross-site scripting." SPI Labs 1 (2005): 1-20.

Bodmer, Fabrice. "Cross-Site Scripting."

Desmedt, Yvo. "Man-in-the-middle attack." Encyclopedia of Cryptography and Security. Springer US, 2011. 759-759.

Joshi, Yogesh, Debabrata Das, and Subir Saha. "Mitigating man in the middle attack over secure sockets layer." Internet Multimedia Services Architecture and Applications (IMSAA), 2009 IEEE International Conference on. IEEE, 2009.

Obaida Mohammad Awad Al-Hazaimeh. “A new approach for complex encrypting and decrypting data.”International Journal of computer networks & communication (IJCNC) Vol.5, No. 2, March 2013.

Dr. Devendra Kumar, Analytical Study of Structure of Models and Techniques of Privacy Preserving Data Mining, International Journal of ICT and Management, June, 2013,Vol-I,Issue-2

Devendra Kumar, Study of Privacy Preserving Data Mining Techniques for Securing Web Services” 27-April, 2013, Proceeding of National Conference on “Role of ICT in Inclusive Sustainable National Development”

Yatin Agarwal, Devendra Kumar, Komal Sharma, Challenges of Artificial Intelligence (past, present and future)” 13-March, 2013, Proceeding of National Conference on “Cloud Computing Technologies and Services”.

Important aspects for securing web serving using privacy data mining Techniques” 24-Nov, 2012, proceeding of National Conference on “Strategies for sustainable growth in the era of Information Technology”




DOI: https://doi.org/10.37628/ijosct.v3i2.302

Refbacks

  • There are currently no refbacks.