Intelligent Interface for Web System Security Enhancement
Keywords:
Security, Man in the middle attack, spoofing, password attackAbstract
Till now, there is no such available product in the market which basically provides the service of hacking. This product/service does that. The proposed work provides service of white hat hacking by implementation of four very popular security attacks dictionary attack, man in the middle attacks, malware attack and SQL injection. It aims to reduce the time complexity of dictionary based attacks significantly with the help of Dockers using the concept of parallel programming. This work also aims to increase awareness among people about various system security attacks so that they know the vulnerabilities their systems are prone to and be saferReferences
Mishra, B. K., & Saini, H. (2009). Cyber attack classification using game theoretic weighted metrics approach. World Applied Sciences Journal, 7, 206-215.
Jovičić, B., & Simić, D. (2006). Common web application attack types and security using asp. net. Computer Science and Information Systems, 3(2), 83-96.
Carnut, M., & Gondim, J. (2003, November). ARP spoofing detection on switched Ethernet networks: A feasibility study. In Proceedings of the 5th Simposio Seguranca em Informatica.
Singh, K. D., & Ahmed, S. T. (2020, July). Systematic Linear Word String Recognition and Evaluation Technique. In 2020 International Conference on Communication and Signal Processing (ICCSP) (pp. 0545-0548). IEEE.
Jayashree, J., Vijayashree, J., Goar, V., & Iyengar, N. C. S. DEADSEC: System Security made Simple using Web User Interface.
Ahmed, S. T., Guptha, N. S., Lavanya, N. L., Basha, S. M., & Fathima, A. S. (2022). IMPROVING MEDICAL IMAGE PIXEL QUALITY USING MICQ UNSUPERVISED MACHINE LEARNING TECHNIQUE. Malaysian Journal of Computer Science, 53-64.
Alblwi, S., & Shujaee, K. (2017). A survey on wireless security protocol WPA2. In Proceedings of the international conference on security and management (SAM) (pp. 12-17). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp).
Rehman, R., Hazarika, G. C., & Chetia, G. (2011). Malware threats and mitigation strategies: a survey. Journal of Theoretical and Applied Information Technology, 29(2), 69-73.
Cashell, B., Jackson, W. D., Jickling, M., & Webel, B. (2004). The economic impact of cyber-attacks. Congressional research service documents, CRS RL32331 (Washington DC), 2.
Fathima, A. S., Prakesh, D., & Kumari, S. (2022). Defined Circle Friend Recommendation Policy for Growing Social Media. International Journal of Human Computations & Intelligence, 1(1), 9-12.
Ahmed, S. T., Singh, D. K., Basha, S. M., Abouel Nasr, E., Kamrani, A. K., & Aboudaif, M. K. (2021). Neural network based mental depression identification and sentiments classification technique from speech signals: A COVID-19 Focused Pandemic Study. Frontiers in public health, 9, 781827.
Chaudhry, J. A., Chaudhry, S. A., & Rittenhouse, R. G. (2016). Phishing attacks and defenses. International journal of security and its applications, 10(1), 247-256.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 J Jayashree, J Vijayashree, N Ch S N Iyengar, Syed Muzamil Basha
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
CC Attribution-NonCommercial-NoDerivatives 4.0