Volume-3-Issue-2 (July 2015)

Privacy Issues in Secure Shell Connections [Download]

Secure Shell is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another. It provides strong authentication and secure communications over insecure channels. It is a replacement for rlogin, rsh, rcp, and rdist. SSH protects a network from attacks such as IP spoofing, IP source routing, and DNS spoofing. An attacker who has managed to take over a network can only force ssh to disconnect. He or she cannot play back the traffic or hijack the connection when encryption is enabled. When using ssh's slogin (instead of rlogin) the entire login session, including transmission of password, is encrypted; therefore it is almost impossible for an outsider to collect passwords.

An Approach for Firewall Security Policy [Download]

A firewall is a network security system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Network firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria. There are several types of firewall techniques that will prevent potentially harmful information from getting through are packet filter, application gateway, circuit-level gateway and proxy server. Proper policies are required to apply firewall over the network.

Intrusion Detection and Prevention Systems - A Cartography based Technique [Download]

An intrusion detection system (IDS) is designed to monitor all inbound and outbound network activity and identify any suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system. IDS is considered to be a passive-monitoring system, since the main function of an IDS product is to warn you of suspicious activity taking place − not prevent them. An IDS essentially reviews your network traffic and data and will identify probes, attacks, exploits and other vulnerabilities. IDSs can respond to the suspicious event in one of several ways, which includes displaying an alert, logging the event or even paging an administrator. In some cases the IDS may be prompted to reconfigure the network to reduce the effects of the suspicious intrusion. Intrusion prevention system assists to prevent from malicious and intentional hacking into the network or system.

Detecting Flood Attacks in Cloud Environment [Download]

Cloud computing based services are prevailing mow-a-days. Distributed Denial of Service attacks can easily exhaust the computing resources or bandwidth of the potential targets, by flooding massive packets, hence these are desirable to be detected and mitigated at the earliest before reaching the victim. Internet infrastructure and communication are under the threat of the DDOS attack. DDOS attacks is challenging and glaring day by day, due to Internet of Things, multifaceted properties of DDOS attacks like dynamic attack rates, various kinds of targets, a large scale of botnets, etc. This paper focuses on Stream-based DDOS defense framework for early detection of DDOS attacks, keeping in mind the network-performance-degradation of the whole system as little as possible. Keywords: DDOS attack, Intrusion Detection, Cloud Security, Flooding attacks.

Using Map Classifiers as Text Filters for Detection of Spam Emails [Download]

There are several ways to block spam from your email inbox and Map classifer is a text filter used for detection of spam emails.. They say prevention is the best medicine, so avoid giving out your email address to unfamiliar or unknown recipients. This has become very difficult to do, however. Spammers can use software programs that troll the Internet looking for email addresses, much like throwing a net in the ocean and seeing what gets caught in it. Nowadays it's almost impossible to shop online without providing a valid email address. Offline stores are even asking for email addresses in exchange for discounts or free merchandise. Realize that what they are doing is potentially opening the door for a flood of unsolicited emails. These organizations will most likely turn around and sell their list to someone else looking for valid emails. In these cases, it might be wise to have more than one email address, one for friends, family and colleagues and another for unfamiliar sources. There are many free email services in cyberspace to choose from. A second way to stop spam is to use your email application's filtering features. Most email applications allow you to block specific messages. When an offending email comes in, set the filter to block further incoming mails from that sender

Supervised Classification Algorithms Using Data Mining- Peformance Evaluation [Download]

Supervised Classification Algorithms Using Data Mining- Peformance Evaluation

Data Integrity Checking in Public Cloud [Download]

Data Integrity Checking in Public Cloud

Reactive and Proactive Routing Protocol in MANET [Download]

Reactive and Proactive Routing Protocol in MANET



















Publication Fee

No Paper Processing & Publication Charges for Accepted Papers Presently.

Paper Submission

There is no deadline for paper submission. Authors are requested to send their unpublished manuscripts to: IJSSTeditor@gmail.com

Copyright

COPYRIGHT © LYALLPUR KHALSA COLLEGE