International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 8, August 2014

A Defense Security Approach against Hacking Using Trusted Graphs

D. N. Rewadkar, Harshal A. Kute

Nowadays, accessing information and exchanging of data in business industry is increasing. But it also increases the risk of Security. One of important security problem is Hacking. Hacking is the practice of modifying the features of system, in order to accomplish a goal outside of the creators original purpose. Number of solutions is provided against hacking but they are unable to address those issues. This paper explains the dynamic security approach for entire infrastructure to protect against hacking. The proposed infrastructure avoids the three pre-hacking steps. It generates the trusted graph and creates the confusion in front of hacker. Hacker cannot understand the current communication infrastructure and it is difficult for him to break the system easily.

Keywords: Component, trusted graph, hacking, network security, understanding agent

Edition: Volume 3 Issue 8, August 2014

Pages: 1879 - 1884


How to Cite this Article?

D. N. Rewadkar, Harshal A. Kute, "A Defense Security Approach against Hacking Using Trusted Graphs", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2015842, Volume 3 Issue 8, August 2014, 1879 - 1884

37 PDF Views | 26 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Component'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2268 - 2273

Electronic Drug Reminder: A New Innovation in the Domain of Automatic Drug Dispensers

Vishal Gawde, Ajit Panada, Ramesh Solanki

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2294 - 2297

Disease Inference and Community-based Health Services

Asif Akram, Rekha Jadhav

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016

Pages: 1965 - 1968

Understanding Dependencies and Analyze Dependencies with DDR Algorithm

Vimal Don Bosco S, Dr. Latha R

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 388 - 391

Use of ?2/3-norm Sparse Representation for Facial Expression Recognition

Sandeep Rangari, Sandeep Gonnade

Share this article



Similar Articles with Keyword 'hacking'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2345 - 2351

Hidden Markovian Model Combined with Dynamic Mode Decomposition for Detecting Deception in Videos

Shyama V S, Mary Linda P A

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 2084 - 2088

Implementation of Efficient Privacy Preserving Data Analysis for Secure Data Transmission

Shital Gawahale, Rekha Jadhav

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2395 - 2399

Shoulder Surfing and Keylogger Resistance using Two Step Graphical Password Scheme

Dhanashree R. Chaudhari, Yogesh B. Gurav

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1255 - 1257

Designing an Improved KISS Environment

Mohinder Singh, Harmandeep Singh

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 5, May 2017

Pages: 2530 - 2533

Shadow Attacks Based On Password Patterns Password Reuses

Bhavika Garse, N. D. Kale

Share this article



Similar Articles with Keyword 'network security'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2178 - 2179

Blocking Misbehaving User & Activities in Social Network

Rashmi Gourkar, Garima Singh

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 690 - 695

Active Watermarking Approach in Detecting Encrypted Traffic Attack by Making Correlation Scheme Robust

Saptshree Dengle, Dr. Santosh Lomte

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 964 - 968

Enforcing Reverse Circle Cipher for Network Security Using Multirotational Technique

Sajjade Zeba-Shazesh, Aruna K. Gupta

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1440 - 1445

Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques

Snehal B Rase, Pranjali Deshmukh

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1287 - 1291

Survey on Straining Attacker?s Impact in WSN using Secure Data Aggregation

Devendra Hapase, S. D. Satav

Share this article
Top