A Defense Security Approach against Hacking Using Trusted Graphs
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 105 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 8, August 2014

A Defense Security Approach against Hacking Using Trusted Graphs

D. N. Rewadkar, Harshal A. Kute

Nowadays, accessing information and exchanging of data in business industry is increasing. But it also increases the risk of Security. One of important security problem is Hacking. Hacking is the practice of modifying the features of system, in order to accomplish a goal outside of the creators original purpose. Number of solutions is provided against hacking but they are unable to address those issues. This paper explains the dynamic security approach for entire infrastructure to protect against hacking. The proposed infrastructure avoids the three pre-hacking steps. It generates the trusted graph and creates the confusion in front of hacker. Hacker cannot understand the current communication infrastructure and it is difficult for him to break the system easily.

Keywords: Component, trusted graph, hacking, network security, understanding agent

Edition: Volume 3 Issue 8, August 2014

Pages: 1879 - 1884

Share this Article

How to Cite this Article?

D. N. Rewadkar, Harshal A. Kute, "A Defense Security Approach against Hacking Using Trusted Graphs", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2015842, Volume 3 Issue 8, August 2014, 1879 - 1884

Enter Your Registered Email Address





Similar Articles with Keyword 'Component'

Downloads: 40 | Weekly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Downloads: 40

Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020

Pages: 1544 - 1554

Recent Developments on Probabilistic Graphical Model Applied in Data Analysis

Kan'Sam Nadjak, Guisheng Yin

Share this Article

Downloads: 100 | Monthly Hits: ⮙8

Research Paper, Computer Science & Engineering, Ghana, Volume 4 Issue 2, February 2015

Pages: 2448 - 2452

Reliable and Rapid Routing Configurations for Network Recovery

William Asiedu K. O. Boateng

Share this Article

Downloads: 100 | Weekly Hits: ⮙1 | Monthly Hits: ⮙8

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016

Pages: 1965 - 1968

Understanding Dependencies and Analyze Dependencies with DDR Algorithm

Vimal Don Bosco S, Dr. Latha R

Share this Article

Downloads: 101 | Weekly Hits: ⮙4 | Monthly Hits: ⮙7

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2019 - 2024

Example Based Color Transfer with Corruptive Artifacts Suppression

Nasreen Pottammel

Share this Article

Similar Articles with Keyword 'hacking'

Downloads: 105 | Weekly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2025 - 2029

Investigation of Security in Cloud Computing

Annu Devi

Share this Article

Downloads: 105 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1879 - 1884

A Defense Security Approach against Hacking Using Trusted Graphs

D. N. Rewadkar, Harshal A. Kute

Share this Article

Downloads: 108 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1255 - 1257

Designing an Improved KISS Environment

Mohinder Singh, Harmandeep Singh

Share this Article

Downloads: 108 | Weekly Hits: ⮙3 | Monthly Hits: ⮙10

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1441 - 1443

A Novel Approach on Multi Factor Authentication

Shivagupta Chandakavathe, Rekha B. S., Sampath Kumar C

Share this Article

Downloads: 109 | Weekly Hits: ⮙3 | Monthly Hits: ⮙10

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 2084 - 2088

Implementation of Efficient Privacy Preserving Data Analysis for Secure Data Transmission

Shital Gawahale, Rekha Jadhav

Share this Article

Similar Articles with Keyword 'network security'

Downloads: 102 | Weekly Hits: ⮙1 | Monthly Hits: ⮙8

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1728 - 1731

Key Management in Wireless Sensor Networks - A Review

Majida C V, Sandhya V

Share this Article

Downloads: 103 | Weekly Hits: ⮙2 | Monthly Hits: ⮙10

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1373 - 1376

Filtering of Malicious Traffic Based on Optimal Source

Pikkili Mahendra, K. Raghavendra Rao

Share this Article

Downloads: 103 | Weekly Hits: ⮙3 | Monthly Hits: ⮙9

Research Paper, Computer Science & Engineering, Bahrain, Volume 5 Issue 10, October 2016

Pages: 1112 - 1116

Network Security Mechanism Based On Static Internet Protocol Addressing

Ahmed D. Asad

Share this Article

Downloads: 104 | Weekly Hits: ⮙5 | Monthly Hits: ⮙9

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2535 - 2538

A Survey on Security Mechanism using Colors and Armstrong Numbers

Nutan Gurav, Pratap Singh

Share this Article

Downloads: 105 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1879 - 1884

A Defense Security Approach against Hacking Using Trusted Graphs

D. N. Rewadkar, Harshal A. Kute

Share this Article



Top