Cloud Computing Based Forensic Analysis for Network Security System
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 4 Issue 9, September 2015

Cloud Computing Based Forensic Analysis for Network Security System

Balkrushna B. Jagadale, Dr. Sujatha Terdal

Internet and network security has been one of the most integral parts of private and public network. In this work we have proposed a real time cloud based security extension that authenticates the user through his Gmail credentials and scans his recent mail through reading RSS feed of the mail service offered by Google. User can choose to blacklist particular s or domains. s and domains blacklisted by multiple users are globally defined as threat and every users mails are filtered based on both local as well as global definition. Further our system scans the network packets through WiFi virtual adapter using Winpcap network monitoring system and makes the statistical data available globally by integrating the logging service with Thingspeak logging and visualizing services.

Keywords: Cloud computing, Anti-phishing, Email Security and Network Security System

Edition: Volume 4 Issue 9, September 2015

Pages: 724 - 728

Share this Article

How to Cite this Article?

Balkrushna B. Jagadale, Dr. Sujatha Terdal, "Cloud Computing Based Forensic Analysis for Network Security System", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB158171, Volume 4 Issue 9, September 2015, 724 - 728

42 PDF Views | 46 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cloud computing'

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment ? A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Masters Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 130 - 134

Implementation of Client-Side Deduplication on Encrypted Data with Public Auditing in Cloud Storage

Lekhashree N R, Shashidhara M S, Santhosh S

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 735 - 737

Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks

Nikhita Nerkar, Vina M Lomte

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1548 - 1550

Survey on Distributed Mobile Cloud Computing Services: Signature Scheme for a Privacy-Aware Authentication

Chaitali P. Kathar, Vidya Dhamdhere

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2369 - 2372

Multi-Level Complex Key Sharing For Secure Access and Authorization on Cloud Platforms

Jaskarandeep Punia, Rajesh Kumar Bawa

Share this Article

Similar Articles with Keyword 'Anti-phishing'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 724 - 728

Cloud Computing Based Forensic Analysis for Network Security System

Balkrushna B. Jagadale, Dr. Sujatha Terdal

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 2, February 2014

Pages: 305 - 310

Anti Phishing using Visual Cryptography

Amit Navarkar, D. A. Phalke

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 278 - 281

Stegano-Cryptographic Technique for Online Polling System

Monalisa Hati

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 6 Issue 2, February 2017

Pages: 878 - 881

A Novel Approach to Anti-Phishing Using Visual Cryptography

Sofia Backiya B., Geetha M., Sathya M., Preethika D.

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 566 - 576

Analysis of Web Phishing Methods

Rishav Shaw, Utkarsh Opalkar, Nayan Mathur, R. Manjula

Share this Article
Top