International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014

Prevention of Mobile Botnet in VPN

Sukhwinder Singh, Navdeep Kaur

Threats are everywhere on the internet, but most significant and crucial threat is Botnet that control and command by a Botmaster. Bot is simply a machine that act as a zombie and try to effect all other machine available in network and that all machine are comes under control of Botmaster. It can detect by using honeypots, spamming botnet, network based, behavior based techniques. There are techniques to detect botnet but there is no scheme for prevent the network from Bot. In this thesis, prevention of botnet can be done by cryptography. Although two basics algorithms MD5 and Blowfish are used to detect and prevent the compromise node. Botnet cannot be delete from the network but possibility is that, neglect compromised node from the network. So, after detection, simply remove that node from the network then network became reliable to communicate.

Keywords: Mobile Botnet, vpn, blowfish, md5

Edition: Volume 3 Issue 9, September 2014

Pages: 572 - 575


How to Cite this Article?

Sukhwinder Singh, Navdeep Kaur, "Prevention of Mobile Botnet in VPN", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SEP14162, Volume 3 Issue 9, September 2014, 572 - 575

26 PDF Views | 24 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'vpn'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1079 - 1082

Information Leak Detection and Prevention

Deepika. S. Patil, Dr. Sujata Terdal

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 572 - 575

Prevention of Mobile Botnet in VPN

Sukhwinder Singh, Navdeep Kaur

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1695 - 1698

Trusted Framework for Secured Information Storage over Cloud Environment

P. Pothuraju, Dasari Rajesh

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 556 - 562

Information Leakage Prevention in IPsec VPN

Vishnu K G, Chinchu Jacob

Share this article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 7, July 2013

Pages: 187 - 189

A Novel Approach for the Analysis & Issues of IPsec VPN

Pankaj Kumar Singh, Pawan Prakash Singh

Share this article



Similar Articles with Keyword 'blowfish'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1833 - 1838

Study of Secure Fault Tolerant Routing Protocol for IoT

Chaithra.S, Gowrishankar S

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1182 - 1185

Implementation of Robust Multi Owner Multi Group Data Security Algorithm for Cloud Environment

Charanraj B R, K.R. Shylaja, Ravinandan M E

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2196 - 2200

Survey on Security Threats and Security Algorithms in Cloud Computing

Kapil A. Ughade, Prof. Nitin R. Chopde

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, Kenya, Volume 6 Issue 3, March 2017

Pages: 1702 - 1708

Enhanced Secure Data Storage in Cloud Computing Using Hybrid Cryptographic Techniques (AES and Blowfish)

Fortine Mata, Michael Kimwele, George Okeyo

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1844 - 1847

A Providing Security on Cloud Data Hadoop using Symmetric Encryption and Identity Authentication

Kale Rohitkumar Bhausaheb, R.L.Paikrao

Share this article



Similar Articles with Keyword 'md5'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 2224 - 2226

Crypt Analyzing of Message Digest Algorithms MD5 Using Quadratic Salt

Pradeep Singh Solanki, Vinit Agarwal

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2196 - 2200

Survey on Security Threats and Security Algorithms in Cloud Computing

Kapil A. Ughade, Prof. Nitin R. Chopde

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2394 - 2397

Multilayered Security Approach for Cloud Data Centers using Hash Functions

Jashanpreet Pal Kaur, Rajbhupinder Kaur

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2885 - 2889

An Efficient Privacy Preserving Scheme over Encrypted Data in Cloud

Kirti Panmand, Sandeep Kadam

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1821 - 1823

A Survey Paper on Cloud Storage Auditing with Key Exposure Resistance

Sneha Singha, S. D. Satav

Share this article
Top