A Defense Security Approach against Hacking Using Trusted Graphs
Journal: International Journal of Science and Research (IJSR) (Vol.3, No. 8)Publication Date: 2014-08-05
Authors : D. N. Rewadkar; Harshal A. Kute;
Page : 1879-1884
Keywords : Component; trusted graph; hacking; network security; understanding agent;
Abstract
Nowadays, accessing information and exchanging of data in business industry is increasing. But it also increases the risk of Security. One of important security problem is Hacking. Hacking is the practice of modifying the features of system, in order to accomplish a goal outside of the creators original purpose. Number of solutions is provided against hacking but they are unable to address those issues. This paper explains the dynamic security approach for entire infrastructure to protect against hacking. The proposed infrastructure avoids the three pre-hacking steps. It generates the trusted graph and creates the confusion in front of hacker. Hacker cannot understand the current communication infrastructure and it is difficult for him to break the system easily.
Other Latest Articles
- Impact of Different Feeds on Growth of Catfish Clarias Batrachus (Gunther)
- Boiler Application Using Wireless Bridge between PLC and SCADA
- Automatic Caption Generation for Pictures Available on Web
- Biological Pretreatment of Six Lignocellulosic Wastes for Bioethanol Production
- Horticulture Fruit Crops Mapping of Adampur and Hisar-IInd Blocks of Hisar District Using Geo-informatics Techniques
Last modified: 2021-06-30 21:05:59