International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064




Downloads: 105 | Views: 116

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 8, August 2014


A Defense Security Approach against Hacking Using Trusted Graphs

D. N. Rewadkar [11] | Harshal A. Kute [2]


Abstract: Nowadays, accessing information and exchanging of data in business industry is increasing. But it also increases the risk of Security. One of important security problem is Hacking. Hacking is the practice of modifying the features of system, in order to accomplish a goal outside of the creators original purpose. Number of solutions is provided against hacking but they are unable to address those issues. This paper explains the dynamic security approach for entire infrastructure to protect against hacking. The proposed infrastructure avoids the three pre-hacking steps. It generates the trusted graph and creates the confusion in front of hacker. Hacker cannot understand the current communication infrastructure and it is difficult for him to break the system easily.


Keywords: Component, trusted graph, hacking, network security, understanding agent


Edition: Volume 3 Issue 8, August 2014,


Pages: 1879 - 1884


How to Download this Article?

Type Your Email Address below to Download the Article PDF


How to Cite this Article?

D. N. Rewadkar, Harshal A. Kute, "A Defense Security Approach against Hacking Using Trusted Graphs", International Journal of Science and Research (IJSR), Volume 3 Issue 8, August 2014, pp. 1879-1884, https://www.ijsr.net/get_abstract.php?paper_id=2015842



Similar Articles with Keyword 'Component'

Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar | Mohan K [15]

Share this Article

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar | Purnima Selokar [2]

Share this Article



Top