Survey on Identification of Hacker by Trapping Mechanism
Journal: International Journal of Trend in Scientific Research and Development (Vol.2, No. 3)Publication Date: 2018-08-02
Authors : C. Ramprasath J. Varun Ms S. SriHeera;
Page : 53-56
Keywords : Cloud security; Hacker; Honeywords; Sentimental Analysis; Social Networks;
Abstract
Advanced persistence threat (APT) attack is to steal data rather than to cause damage to the network or organization. It is one of the initial phases in successful hacking of a system. Here, user's behaviour is analysed based on previous behaviour such as posted data, time of posting, IP address and location of usage of social network. This system includes two processes. The Social network accounts are analysed, tracked and then detected. If the hacker attacks the original user's account, then the system allows the attacker to proceed further until our system captures all the important information about the attacker by directing the hacker to the fake website. The system generates Honeywords based on the user information provided and the original password is converted into another format and stored along with the honeywords. Attacker who knows the E-mail account of original user can easily reset the password of the cloud server. When the attacker tries to login into the purchase portal, he/she is tracked and allowed to do purchase. Server identifies the attacker and sends an alert message to the owner and blocks the attacker from doing transaction from his original account. C. Ramprasath | J. Varun | Ms S. SriHeera"Survey on Identification of Hacker by Trapping Mechanism" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd10789.pdf http://www.ijtsrd.com/computer-science/computer-security/10789/survey-on-identification-of-hacker-by-trapping-mechanism/c-ramprasath
Other Latest Articles
- Alert System for Unmanned Railway Crossing using GPS - A Survey
- Challenges and Emerging Technology in 5G
- Study on Laser Communication: Features, Application, Advantages
- Efficient DDoS Attack Detection and Prevention Framework Using Two-Level Classification in Cloud Environment
- The Effect of Homemade Drink on Exercise Endrance Time in Young Adult Females
Last modified: 2018-08-02 18:58:28