Downloads: 105 | Views: 310
Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 8, August 2014 | Popularity: 6.3 / 10
A Defense Security Approach against Hacking Using Trusted Graphs
D. N. Rewadkar, Harshal A. Kute
Abstract: Nowadays, accessing information and exchanging of data in business industry is increasing. But it also increases the risk of Security. One of important security problem is Hacking. Hacking is the practice of modifying the features of system, in order to accomplish a goal outside of the creators original purpose. Number of solutions is provided against hacking but they are unable to address those issues. This paper explains the dynamic security approach for entire infrastructure to protect against hacking. The proposed infrastructure avoids the three pre-hacking steps. It generates the trusted graph and creates the confusion in front of hacker. Hacker cannot understand the current communication infrastructure and it is difficult for him to break the system easily.
Keywords: Component, trusted graph, hacking, network security, understanding agent
Edition: Volume 3 Issue 8, August 2014
Pages: 1879 - 1884
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 138 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2246 - 2249Packet Analysis with Network Intrusion Detection System
Rashmi Hebbar, Mohan K
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Review Papers, Computer Science & Engineering, India, Volume 12 Issue 5, May 2023
Pages: 1296 - 1301An Examination of the Applications of Quantum Artificial Intelligence to Addressing Climate Change Effects
Karan Chawla
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 12 Issue 5, May 2023
Pages: 2419 - 2423Hand Sign Language Translation System Using Machine Learning
Karampudi Dishank Jagadeeshnaidu
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Informative Article, Computer Science & Engineering, India, Volume 12 Issue 6, June 2023
Pages: 2966 - 2970Security in Kubernetes: A Comprehensive Review of Best Practices
Dinesh Reddy Chittibala
Downloads: 2
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar