SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 6, Issue 9 (April 2013), PP. 48-52
48
Robust Encryption and Decryption (RED) Component
and Standard Encrypt Syntax (SES) For Web Services
Security Architecture
Abhilash R1
, Saravanan E2
,Kalpana G3
1
M.Tech,Information Security and Cyber Forensics, Dr.M.G.R. Educational and Research Institute University
2
Asst.Professor, Dr.M.G.R. Educational and Research Institute University
3
Asst.Professor, Dr.M.G.R. Educational and Research Institute University
Abstract:- With changes in technological landscape the threats and vulnerabilities in network are
rising at an alarming rate. There are many complexities specific to, and inherent in Web services that
further complicate their security. Numerous threats can compromise the confidentiality, integrity, or
availability of a Web service or the back-end systems that a Web service might expose. This paper
discusses re-modeling web services security architecture from security attacks such as network security
attacks, E-Commerce attacks and man in the middle attacks. A detailed conceptual framework is
proposed, based on how safely to send valuable packets to the destination without any security attacks.
This framework is based on providing a Robust Encryption and Decryption (RED) technique for web
browser and the web server and Standard Encrypt Syntax (SES) to web application.
Keywords:- Web Security, Threats and Vulnerabilities in web, Cryptography, Web Security
Architecture
I. INTRODUCTION
Today, there is an ever-growing dependency on computer networks for business transactions. With the
free flow of information and the availability of vast resources, users of enterprise networks have to understand
all the possible threats. These threats[3,9] take many forms; but all result in loss of privacy to some degree and
possibility of malicious destruction of information or resources, that can lead to large monetary losses.
Though many countermeasures are in place taken to provide secure internet, there are still some holes in the
network which lead to severe security attacks[7]. This paper discusses the holes in the network and provides a
detailed conceptual framework to avoid these threats and vulnerabilities.
II. SECURITY THREATS AND VULNERABILITIES IN WEB SERVICES
When we surf the Web, or send E-Mail, the communications between our computer and the server
takes place via the data packet. It is the data packet that contains the information and the request for information
that is sent from our computer to other computers over the Internet. The communication protocol which is used
to govern the flow of data packets is called Transmission Control Protocol/Internet protocol or TCP/IP for
short.
A. Eavesdropping
Eavesdropping, a network packet capturing application that collates and displays all packets in a user
understandable format that passes in communication channel. Intruder understands and gain information about
the packet.
A sample skype Trojan source snippet:
If (fPFWCircumventionStatus [mCircumventionType] (mGetBuffer, mProxyCon
REQUEST_TYPE_SYSTEMUP) != 0)
Sleep(NOCONNECTIVITYSLEEP);
else{
remoteStatusChecks(mGetBuffer);
mConnectivity=1;
}}
B. TCP Hijacking
Weakness in creating TCP connections will open way for new attacks such as TCP/IP hijacking.
TCP/IP hijacking technique[4] uses spoofed packets to take over a connection between a victim and a host
Robust Encryption and Decryption (RED) Component and Standard Encrypt…
49
machine. It is successfully done by predicting intial sequence number that gets exchanged between victim and
host.
C. Session hijacking
Session tokens are passed between client and server when server authenticates a client during login.
Attackers hijack these session tokens and use it to acquire unauthorized access to web server.
<?php
If(isset($_REQUEST[“cmd”]))
{
Sf=fopen(“stolen.txt”,”w+”);
fwrite(Sf,$_REQUEST[“cmd”].”<br>”);
fclose(sf);
}
D. Network sniffing
It is a technique of capturing network packets that are transferred in communication links. It captures
all network packets and provides clear information about packets to intruder which results in attacks like
eavesdropping, man-in-the-middle attack.
Sample code for incoming traffic on all ports
WSAIoct1(thisSocket, &inn, sizeof(inn), &out, sizeof(out))
III. EXISTING SYSTEM
A. SSL/TLS Certificate:
SSL[8] is an encryption technology that provides secure communication between client and server by
encrypting packet information and link. It involves
 SSL Server Authentication
 SSL Client Authentication
 An Encrypted SSL Connection
It protects data passed between communication links from network attacks such as sniffing, spoofing,
data tampering. These certificates are issued by third party companies.
B. Disadvantages of SSL
1. SSL reduces site speed: SSL can reduce the time it takes for data to travel between the user and website
by two to ten times. Moreover it increases network traffic by 300 percent.
2. SSL costs money: The cost of SSL is more which looks very expensive for single one who maintains
site.
3. SSL isn’t secure: As day-by day many attacking techniques evolves, SSL fails to provide security.
4. SSL regular renewal: SSL certificates have to be renewed regularly and it fails if renewal is not done
on time.
5. Complex installation of SSL: Installing process of SSL is very complex.
IV. COUNTERMEASURES: RE-MODELING WEB SERVICES SECURITY
ARCHITECTURE
The key to effective Web services security[11] is to know the threats as described previously,
understand the technical solutions for mitigating these threats, and then establish and follow a defined
engineering process that takes security into consideration from the beginning and throughout the Web service
life cycle. This process can be established in the following two steps:
1. Deployment of Robust Encryption and Decryption Entity [RED] for Browser and Web Server
2. Deployment of Standard Encrypt Syntax
A. Robust Encryption and Decryption Entity [RED] for Browser and Web Server
A detailed conceptual framework is proposed on how safely to send valuable packets to destination
without any security attacks related to web services. This proposed framework is based on providing a common
encryption and decryption component that should be deployed in both web browser and the web server.
1. RED Component: A set of common standard encryption algorithm such as RSA, DES could be
grouped together as a component and be deployed in both web server and web browser. This could be done
by adding
Robust Encryption and Decryption (RED) Component and Standard Encrypt…
50
 Add-on service
 Updating the browser/server
Every Algorithm has its own unique id in RED.
For eg: RSA id=3341
Standard Encrypt Syntax in the code calls a particular algorithm from RED to encrypt or decrypt a page.
2. Deployment of RED In Browser: Communication between browser [10] and RED is given below.
Fig 1.2: Communication between Browser and RED
3. Deployment of RED in Web Server: Communication between Server and RED, before and after a web page
is uploaded in to server.
Fig 1.1: Communication between User, Server and RED
B. Deployment of SES
Standard Encrypt Syntax (SES) will be a common code embedded in any programming language to
communicate with RED in browser and server.
1) The syntax for accessing RED:
<SES id=”Encryption Algorithm ID” name=”User defined Encryption name” key=”key_name”> </SES>
For every request been processed, RED encrypts or decrypts from the algorithm and key referred in SES
tag.
2) Algorithm with no key exchange:
<SES id=”Encryption Algorithm ID” name=”User defined Encryption name” key=”no-key”> </SES>
3) Algorithm with single key exchange:
<SES id=”Encryption Algorithm ID” name=”User defined Encryption name” key=”key_name”> </SES>
4) Algorithm with multiple key exchanges:
Cryptographic algorithm with a multiple key[2] could be represented as,
<SES id=”Encryption Algorithm ID” name=”User defined Encryption name” key=”key_name1,
key_name2,key_name3….”></SES>
5) Public Key Algorithm:
Public key Cryptographic algorithm[1] with private key and public key
<SES id=”Encryption Algorithm ID” name=”User defined Encryption name” publickey= ”key_name”
private-key=”key_name”></SES>
Robust Encryption and Decryption (RED) Component and Standard Encrypt…
51
C. Working of RED
The web developer after designing a webpage can use an encryption algorithm from RED which could be added
as a tag in the webpage. While hosting the webpage to the server, the developer is intimated for choose of any
cryptographic algorithm. Therefore, before a data is been send to communication channel, it encrypts with
above mentioned algorithm and send.
Fig 1.1: Robust Encryption and Decryption Component for Web Browser and Web Server
Similarly, when server response to a user, data is encrypted. Browser decrypts the content of the page
by same cryptographic algorithm which is mentioned in the SES tag.
D. From Developer’s Perspective:
There are certain options could be implemented from developer’s perspective:
1) Determine a suitable encryption algorithm from RED
Developer can choose any algorithm [6] of his choice suitable for his webpage from RED. Developer
need not be a cryptographer. Implementing a cryptographic algorithm is done by adding a small SES tag in to
his web page.
2) Encrypt Priority fields
Encryption and Decryption technique can possibly place a high load on the server/client proportionate
to the size of the webpage. Considering a webpage with content larger than 2mb, there is a possibility of time
delay in loading the content of the webpage.
In order to reduce the time in loading and to provide more efficiency, the developer can encrypt a part of a
webpage which he is going to give more priority. It may be a form field or a table of content. Encryption is done
on priority basis. For instance consider an E-Commerce website. The Developer gives more attention on form
fields and transaction links. Therefore he can encrypt that part of priority areas.
<body>
<div>…….</div>
<SES id=”2233” name=”Caesar” key=”no-key”>
<div> <form>…..</form></div>
</SES>
V. ADVANTAGES
1. Deploying RED component is done by simple updating or through add-ons.
2. Accessing RED is done by simple SES tag that is supported by RED.
3. Another advantage over sniffers is after the user types his username and password and clicks send, the
username and passwords are encrypted and sent via packets. If an intruder tries to capture and view the packet
Robust Encryption and Decryption (RED) Component and Standard Encrypt…
52
information, there will be no possibility of identifying the actual information. This ensures more security on
networks.
4. Instead going for paid secure services, this framework can bring security to entire network.
VI. CONCLUSION
Due to enormous threats and vulnerabilities, there is a desperate need for some standards that should
prevent and deter the attackers. Implementing this Robust Encryption and Decryption component and Standard
Encrypt Syntax will add a higher level of security to the communication channel.
REFERENCES
[1] V. Shoup, “A proposal for an ISO standard for public key encryption”, http://eprint.iacr.org/2001/112,
2001.
[2] S. S. Al-Riyami and K. G. Paterson. “Authenticated three party key agreement protocols from
pairings.” Cryptology e-Print Archive, http://eprint.iacr.org/2002/035/
[3] R. C. Summers, “Secure Computing” – Threats and Safeguards, McGraw-Hill, 1997
[4] CERT, “TCP SYN Flooding and IP Spoofing Attacks”, Carnegie Mellon University, Sept. 1996
[5] Eastlake and P. Jones, US Secure Hash Algorithm 1 (SHA1), IETF RFC 3174, Sept. 2001.
[6] Choosing an encryption algorithm: technet.microsoft.com/en-us/library/ms345262.aspx
[7] Common types of network attacks: http://technet.microsoft.com/en-us/library/cc959354.aspx
[8] Understanding of digital certificates and SSL: http://www.entrust.net/ssl-
resources/pdf/understanding_ssl.pdf
[9] Web security threats: http://www.gfi.com/whitepapers/GFI-Web_Based_Threats_v2_Whitepaper.pdf
[10] Browser security and privacy: http://www.securingthehuman.org/newsletters/ouch/issues/OUCH-
201111_en.pdf
[11] Bhandari R, Suman U, “Generalized Framework for Secure Web Service Composition”

Más contenido relacionado

La actualidad más candente

A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK IJNSA Journal
 
Mattias eriksson
Mattias erikssonMattias eriksson
Mattias erikssonHai Nguyen
 
CEH v9 cheat sheet notes Certified Ethical Hacker
CEH v9 cheat sheet notes  Certified Ethical HackerCEH v9 cheat sheet notes  Certified Ethical Hacker
CEH v9 cheat sheet notes Certified Ethical HackerDavid Sweigert
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINcscpconf
 
Email Security Presentation
Email Security PresentationEmail Security Presentation
Email Security PresentationYosef Gamble
 
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...IJNSA Journal
 
E-mail Security in Network Security NS5
E-mail Security in Network Security NS5E-mail Security in Network Security NS5
E-mail Security in Network Security NS5koolkampus
 
Certified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheetCertified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheetDavid Sweigert
 
Implementation of public key cryptography in kerberos with prevention 2
Implementation of public key cryptography in kerberos with prevention 2Implementation of public key cryptography in kerberos with prevention 2
Implementation of public key cryptography in kerberos with prevention 2IAEME Publication
 
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LANAvoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LANEditor IJCATR
 

La actualidad más candente (19)

Web Security
Web SecurityWeb Security
Web Security
 
Web Security
Web SecurityWeb Security
Web Security
 
Network Security
Network  SecurityNetwork  Security
Network Security
 
Net Sec
Net SecNet Sec
Net Sec
 
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
 
Security
SecuritySecurity
Security
 
Cit877[1]
Cit877[1]Cit877[1]
Cit877[1]
 
14 577
14 57714 577
14 577
 
Mattias eriksson
Mattias erikssonMattias eriksson
Mattias eriksson
 
CEH v9 cheat sheet notes Certified Ethical Hacker
CEH v9 cheat sheet notes  Certified Ethical HackerCEH v9 cheat sheet notes  Certified Ethical Hacker
CEH v9 cheat sheet notes Certified Ethical Hacker
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
 
Email Security Presentation
Email Security PresentationEmail Security Presentation
Email Security Presentation
 
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
 
E-mail Security in Network Security NS5
E-mail Security in Network Security NS5E-mail Security in Network Security NS5
E-mail Security in Network Security NS5
 
5 Ways To Fight A DDoS Attack
5 Ways To Fight A DDoS Attack5 Ways To Fight A DDoS Attack
5 Ways To Fight A DDoS Attack
 
Certified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheetCertified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheet
 
Implementation of public key cryptography in kerberos with prevention 2
Implementation of public key cryptography in kerberos with prevention 2Implementation of public key cryptography in kerberos with prevention 2
Implementation of public key cryptography in kerberos with prevention 2
 
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LANAvoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
 
Ijcnc050205
Ijcnc050205Ijcnc050205
Ijcnc050205
 

Destacado

Catalogo 2011 2012 colori e stoffe
Catalogo 2011 2012 colori e stoffeCatalogo 2011 2012 colori e stoffe
Catalogo 2011 2012 colori e stoffeicse
 
Biblioteca municipală.anul bibliologic
Biblioteca  municipală.anul bibliologicBiblioteca  municipală.anul bibliologic
Biblioteca municipală.anul bibliologicEugeniuCoseriu
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Jussi Mälkiä 4.4.2013: Biotaloudella tulevaisuuteen
Jussi Mälkiä 4.4.2013: Biotaloudella tulevaisuuteenJussi Mälkiä 4.4.2013: Biotaloudella tulevaisuuteen
Jussi Mälkiä 4.4.2013: Biotaloudella tulevaisuuteenSitra / Ekologinen kestävyys
 
Mussinano paola
Mussinano paolaMussinano paola
Mussinano paolamux171
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Efficient Migration of Verilog Testbenches to 'UVM' Keeping the Functionality...
Efficient Migration of Verilog Testbenches to 'UVM' Keeping the Functionality...Efficient Migration of Verilog Testbenches to 'UVM' Keeping the Functionality...
Efficient Migration of Verilog Testbenches to 'UVM' Keeping the Functionality...DVClub
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
庭劇団ペニノはこぶね新作『大きなトランクの中の箱』公開記念スライド
庭劇団ペニノはこぶね新作『大きなトランクの中の箱』公開記念スライド庭劇団ペニノはこぶね新作『大きなトランクの中の箱』公開記念スライド
庭劇団ペニノはこぶね新作『大きなトランクの中の箱』公開記念スライドniwagekidan
 
Hiệp khánh hành - 76
Hiệp khánh hành - 76Hiệp khánh hành - 76
Hiệp khánh hành - 76Thao Le
 
DLI Travel Pilgrimage Tours
DLI Travel Pilgrimage Tours DLI Travel Pilgrimage Tours
DLI Travel Pilgrimage Tours DLI TRAVEL
 
Hiệp khánh hành - 70
Hiệp khánh hành - 70Hiệp khánh hành - 70
Hiệp khánh hành - 70Thao Le
 
Hiệp khánh hành - 78
Hiệp khánh hành - 78Hiệp khánh hành - 78
Hiệp khánh hành - 78Thao Le
 

Destacado (20)

Catalogo 2011 2012 colori e stoffe
Catalogo 2011 2012 colori e stoffeCatalogo 2011 2012 colori e stoffe
Catalogo 2011 2012 colori e stoffe
 
Biblioteca municipală.anul bibliologic
Biblioteca  municipală.anul bibliologicBiblioteca  municipală.anul bibliologic
Biblioteca municipală.anul bibliologic
 
Pedro Brey
Pedro Brey Pedro Brey
Pedro Brey
 
Yuehui Tang
Yuehui TangYuehui Tang
Yuehui Tang
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Jussi Mälkiä 4.4.2013: Biotaloudella tulevaisuuteen
Jussi Mälkiä 4.4.2013: Biotaloudella tulevaisuuteenJussi Mälkiä 4.4.2013: Biotaloudella tulevaisuuteen
Jussi Mälkiä 4.4.2013: Biotaloudella tulevaisuuteen
 
Chris Teegan, Operations Director
Chris Teegan, Operations DirectorChris Teegan, Operations Director
Chris Teegan, Operations Director
 
Mussinano paola
Mussinano paolaMussinano paola
Mussinano paola
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Efficient Migration of Verilog Testbenches to 'UVM' Keeping the Functionality...
Efficient Migration of Verilog Testbenches to 'UVM' Keeping the Functionality...Efficient Migration of Verilog Testbenches to 'UVM' Keeping the Functionality...
Efficient Migration of Verilog Testbenches to 'UVM' Keeping the Functionality...
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
庭劇団ペニノはこぶね新作『大きなトランクの中の箱』公開記念スライド
庭劇団ペニノはこぶね新作『大きなトランクの中の箱』公開記念スライド庭劇団ペニノはこぶね新作『大きなトランクの中の箱』公開記念スライド
庭劇団ペニノはこぶね新作『大きなトランクの中の箱』公開記念スライド
 
Hiệp khánh hành - 76
Hiệp khánh hành - 76Hiệp khánh hành - 76
Hiệp khánh hành - 76
 
N5
N5N5
N5
 
DLI Travel Pilgrimage Tours
DLI Travel Pilgrimage Tours DLI Travel Pilgrimage Tours
DLI Travel Pilgrimage Tours
 
N4
N4N4
N4
 
Malalasekera
MalalasekeraMalalasekera
Malalasekera
 
Hiệp khánh hành - 70
Hiệp khánh hành - 70Hiệp khánh hành - 70
Hiệp khánh hành - 70
 
Hiệp khánh hành - 78
Hiệp khánh hành - 78Hiệp khánh hành - 78
Hiệp khánh hành - 78
 

Similar a Welcome to International Journal of Engineering Research and Development (IJERD)

Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperShakas Technologies
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperShakas Technologies
 
Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)Jayanth Dwijesh H P
 
Communications Technologies
Communications TechnologiesCommunications Technologies
Communications TechnologiesSarah Jimenez
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET Journal
 
Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.Jayanth Dwijesh H P
 
Security Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iSecurity Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iinventionjournals
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layerAhmed Elnaggar
 
Network Security_Module_2.pdf
Network Security_Module_2.pdfNetwork Security_Module_2.pdf
Network Security_Module_2.pdfDr. Shivashankar
 
IRJET- A Survey on DDOS Attack in Manet
IRJET-  	  A Survey on DDOS Attack in ManetIRJET-  	  A Survey on DDOS Attack in Manet
IRJET- A Survey on DDOS Attack in ManetIRJET Journal
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointJanet Robinson
 
Web-style Wireless IDS attacks, Sergey Gordeychik
Web-style Wireless IDS attacks, Sergey GordeychikWeb-style Wireless IDS attacks, Sergey Gordeychik
Web-style Wireless IDS attacks, Sergey Gordeychikqqlan
 
Security of software defined networking (sdn) and cognitive radio network (crn)
Security of software defined networking (sdn) and  cognitive radio network (crn)Security of software defined networking (sdn) and  cognitive radio network (crn)
Security of software defined networking (sdn) and cognitive radio network (crn)Ameer Sameer
 
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsLayered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsEditor IJCATR
 
IJSRED-V2I1P29
IJSRED-V2I1P29IJSRED-V2I1P29
IJSRED-V2I1P29IJSRED
 

Similar a Welcome to International Journal of Engineering Research and Development (IJERD) (20)

Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
RAZORPOINT SECURITY GLOSSARY
RAZORPOINT SECURITY GLOSSARYRAZORPOINT SECURITY GLOSSARY
RAZORPOINT SECURITY GLOSSARY
 
Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)
 
Communications Technologies
Communications TechnologiesCommunications Technologies
Communications Technologies
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
 
Unit 6
Unit 6Unit 6
Unit 6
 
Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.
 
Security Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iSecurity Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11i
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layer
 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final ppt
 
Network Security_Module_2.pdf
Network Security_Module_2.pdfNetwork Security_Module_2.pdf
Network Security_Module_2.pdf
 
IRJET- A Survey on DDOS Attack in Manet
IRJET-  	  A Survey on DDOS Attack in ManetIRJET-  	  A Survey on DDOS Attack in Manet
IRJET- A Survey on DDOS Attack in Manet
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 
Web-style Wireless IDS attacks, Sergey Gordeychik
Web-style Wireless IDS attacks, Sergey GordeychikWeb-style Wireless IDS attacks, Sergey Gordeychik
Web-style Wireless IDS attacks, Sergey Gordeychik
 
Security of software defined networking (sdn) and cognitive radio network (crn)
Security of software defined networking (sdn) and  cognitive radio network (crn)Security of software defined networking (sdn) and  cognitive radio network (crn)
Security of software defined networking (sdn) and cognitive radio network (crn)
 
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsLayered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
 
IJSRED-V2I1P29
IJSRED-V2I1P29IJSRED-V2I1P29
IJSRED-V2I1P29
 

Más de IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignIJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationIJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingIJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart GridIJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
 

Más de IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Último

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Welcome to International Journal of Engineering Research and Development (IJERD)

  • 1. International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 6, Issue 9 (April 2013), PP. 48-52 48 Robust Encryption and Decryption (RED) Component and Standard Encrypt Syntax (SES) For Web Services Security Architecture Abhilash R1 , Saravanan E2 ,Kalpana G3 1 M.Tech,Information Security and Cyber Forensics, Dr.M.G.R. Educational and Research Institute University 2 Asst.Professor, Dr.M.G.R. Educational and Research Institute University 3 Asst.Professor, Dr.M.G.R. Educational and Research Institute University Abstract:- With changes in technological landscape the threats and vulnerabilities in network are rising at an alarming rate. There are many complexities specific to, and inherent in Web services that further complicate their security. Numerous threats can compromise the confidentiality, integrity, or availability of a Web service or the back-end systems that a Web service might expose. This paper discusses re-modeling web services security architecture from security attacks such as network security attacks, E-Commerce attacks and man in the middle attacks. A detailed conceptual framework is proposed, based on how safely to send valuable packets to the destination without any security attacks. This framework is based on providing a Robust Encryption and Decryption (RED) technique for web browser and the web server and Standard Encrypt Syntax (SES) to web application. Keywords:- Web Security, Threats and Vulnerabilities in web, Cryptography, Web Security Architecture I. INTRODUCTION Today, there is an ever-growing dependency on computer networks for business transactions. With the free flow of information and the availability of vast resources, users of enterprise networks have to understand all the possible threats. These threats[3,9] take many forms; but all result in loss of privacy to some degree and possibility of malicious destruction of information or resources, that can lead to large monetary losses. Though many countermeasures are in place taken to provide secure internet, there are still some holes in the network which lead to severe security attacks[7]. This paper discusses the holes in the network and provides a detailed conceptual framework to avoid these threats and vulnerabilities. II. SECURITY THREATS AND VULNERABILITIES IN WEB SERVICES When we surf the Web, or send E-Mail, the communications between our computer and the server takes place via the data packet. It is the data packet that contains the information and the request for information that is sent from our computer to other computers over the Internet. The communication protocol which is used to govern the flow of data packets is called Transmission Control Protocol/Internet protocol or TCP/IP for short. A. Eavesdropping Eavesdropping, a network packet capturing application that collates and displays all packets in a user understandable format that passes in communication channel. Intruder understands and gain information about the packet. A sample skype Trojan source snippet: If (fPFWCircumventionStatus [mCircumventionType] (mGetBuffer, mProxyCon REQUEST_TYPE_SYSTEMUP) != 0) Sleep(NOCONNECTIVITYSLEEP); else{ remoteStatusChecks(mGetBuffer); mConnectivity=1; }} B. TCP Hijacking Weakness in creating TCP connections will open way for new attacks such as TCP/IP hijacking. TCP/IP hijacking technique[4] uses spoofed packets to take over a connection between a victim and a host
  • 2. Robust Encryption and Decryption (RED) Component and Standard Encrypt… 49 machine. It is successfully done by predicting intial sequence number that gets exchanged between victim and host. C. Session hijacking Session tokens are passed between client and server when server authenticates a client during login. Attackers hijack these session tokens and use it to acquire unauthorized access to web server. <?php If(isset($_REQUEST[“cmd”])) { Sf=fopen(“stolen.txt”,”w+”); fwrite(Sf,$_REQUEST[“cmd”].”<br>”); fclose(sf); } D. Network sniffing It is a technique of capturing network packets that are transferred in communication links. It captures all network packets and provides clear information about packets to intruder which results in attacks like eavesdropping, man-in-the-middle attack. Sample code for incoming traffic on all ports WSAIoct1(thisSocket, &inn, sizeof(inn), &out, sizeof(out)) III. EXISTING SYSTEM A. SSL/TLS Certificate: SSL[8] is an encryption technology that provides secure communication between client and server by encrypting packet information and link. It involves  SSL Server Authentication  SSL Client Authentication  An Encrypted SSL Connection It protects data passed between communication links from network attacks such as sniffing, spoofing, data tampering. These certificates are issued by third party companies. B. Disadvantages of SSL 1. SSL reduces site speed: SSL can reduce the time it takes for data to travel between the user and website by two to ten times. Moreover it increases network traffic by 300 percent. 2. SSL costs money: The cost of SSL is more which looks very expensive for single one who maintains site. 3. SSL isn’t secure: As day-by day many attacking techniques evolves, SSL fails to provide security. 4. SSL regular renewal: SSL certificates have to be renewed regularly and it fails if renewal is not done on time. 5. Complex installation of SSL: Installing process of SSL is very complex. IV. COUNTERMEASURES: RE-MODELING WEB SERVICES SECURITY ARCHITECTURE The key to effective Web services security[11] is to know the threats as described previously, understand the technical solutions for mitigating these threats, and then establish and follow a defined engineering process that takes security into consideration from the beginning and throughout the Web service life cycle. This process can be established in the following two steps: 1. Deployment of Robust Encryption and Decryption Entity [RED] for Browser and Web Server 2. Deployment of Standard Encrypt Syntax A. Robust Encryption and Decryption Entity [RED] for Browser and Web Server A detailed conceptual framework is proposed on how safely to send valuable packets to destination without any security attacks related to web services. This proposed framework is based on providing a common encryption and decryption component that should be deployed in both web browser and the web server. 1. RED Component: A set of common standard encryption algorithm such as RSA, DES could be grouped together as a component and be deployed in both web server and web browser. This could be done by adding
  • 3. Robust Encryption and Decryption (RED) Component and Standard Encrypt… 50  Add-on service  Updating the browser/server Every Algorithm has its own unique id in RED. For eg: RSA id=3341 Standard Encrypt Syntax in the code calls a particular algorithm from RED to encrypt or decrypt a page. 2. Deployment of RED In Browser: Communication between browser [10] and RED is given below. Fig 1.2: Communication between Browser and RED 3. Deployment of RED in Web Server: Communication between Server and RED, before and after a web page is uploaded in to server. Fig 1.1: Communication between User, Server and RED B. Deployment of SES Standard Encrypt Syntax (SES) will be a common code embedded in any programming language to communicate with RED in browser and server. 1) The syntax for accessing RED: <SES id=”Encryption Algorithm ID” name=”User defined Encryption name” key=”key_name”> </SES> For every request been processed, RED encrypts or decrypts from the algorithm and key referred in SES tag. 2) Algorithm with no key exchange: <SES id=”Encryption Algorithm ID” name=”User defined Encryption name” key=”no-key”> </SES> 3) Algorithm with single key exchange: <SES id=”Encryption Algorithm ID” name=”User defined Encryption name” key=”key_name”> </SES> 4) Algorithm with multiple key exchanges: Cryptographic algorithm with a multiple key[2] could be represented as, <SES id=”Encryption Algorithm ID” name=”User defined Encryption name” key=”key_name1, key_name2,key_name3….”></SES> 5) Public Key Algorithm: Public key Cryptographic algorithm[1] with private key and public key <SES id=”Encryption Algorithm ID” name=”User defined Encryption name” publickey= ”key_name” private-key=”key_name”></SES>
  • 4. Robust Encryption and Decryption (RED) Component and Standard Encrypt… 51 C. Working of RED The web developer after designing a webpage can use an encryption algorithm from RED which could be added as a tag in the webpage. While hosting the webpage to the server, the developer is intimated for choose of any cryptographic algorithm. Therefore, before a data is been send to communication channel, it encrypts with above mentioned algorithm and send. Fig 1.1: Robust Encryption and Decryption Component for Web Browser and Web Server Similarly, when server response to a user, data is encrypted. Browser decrypts the content of the page by same cryptographic algorithm which is mentioned in the SES tag. D. From Developer’s Perspective: There are certain options could be implemented from developer’s perspective: 1) Determine a suitable encryption algorithm from RED Developer can choose any algorithm [6] of his choice suitable for his webpage from RED. Developer need not be a cryptographer. Implementing a cryptographic algorithm is done by adding a small SES tag in to his web page. 2) Encrypt Priority fields Encryption and Decryption technique can possibly place a high load on the server/client proportionate to the size of the webpage. Considering a webpage with content larger than 2mb, there is a possibility of time delay in loading the content of the webpage. In order to reduce the time in loading and to provide more efficiency, the developer can encrypt a part of a webpage which he is going to give more priority. It may be a form field or a table of content. Encryption is done on priority basis. For instance consider an E-Commerce website. The Developer gives more attention on form fields and transaction links. Therefore he can encrypt that part of priority areas. <body> <div>…….</div> <SES id=”2233” name=”Caesar” key=”no-key”> <div> <form>…..</form></div> </SES> V. ADVANTAGES 1. Deploying RED component is done by simple updating or through add-ons. 2. Accessing RED is done by simple SES tag that is supported by RED. 3. Another advantage over sniffers is after the user types his username and password and clicks send, the username and passwords are encrypted and sent via packets. If an intruder tries to capture and view the packet
  • 5. Robust Encryption and Decryption (RED) Component and Standard Encrypt… 52 information, there will be no possibility of identifying the actual information. This ensures more security on networks. 4. Instead going for paid secure services, this framework can bring security to entire network. VI. CONCLUSION Due to enormous threats and vulnerabilities, there is a desperate need for some standards that should prevent and deter the attackers. Implementing this Robust Encryption and Decryption component and Standard Encrypt Syntax will add a higher level of security to the communication channel. REFERENCES [1] V. Shoup, “A proposal for an ISO standard for public key encryption”, http://eprint.iacr.org/2001/112, 2001. [2] S. S. Al-Riyami and K. G. Paterson. “Authenticated three party key agreement protocols from pairings.” Cryptology e-Print Archive, http://eprint.iacr.org/2002/035/ [3] R. C. Summers, “Secure Computing” – Threats and Safeguards, McGraw-Hill, 1997 [4] CERT, “TCP SYN Flooding and IP Spoofing Attacks”, Carnegie Mellon University, Sept. 1996 [5] Eastlake and P. Jones, US Secure Hash Algorithm 1 (SHA1), IETF RFC 3174, Sept. 2001. [6] Choosing an encryption algorithm: technet.microsoft.com/en-us/library/ms345262.aspx [7] Common types of network attacks: http://technet.microsoft.com/en-us/library/cc959354.aspx [8] Understanding of digital certificates and SSL: http://www.entrust.net/ssl- resources/pdf/understanding_ssl.pdf [9] Web security threats: http://www.gfi.com/whitepapers/GFI-Web_Based_Threats_v2_Whitepaper.pdf [10] Browser security and privacy: http://www.securingthehuman.org/newsletters/ouch/issues/OUCH- 201111_en.pdf [11] Bhandari R, Suman U, “Generalized Framework for Secure Web Service Composition”