Cryptographic Provenance Verification For Secure Hosts

Cryptographic Provenance Verification For Secure Hosts
Authors : P .Angel, S. Hemalatha
Publication Date: 30-01-2013


Author(s):  P .Angel, S. Hemalatha

Published in:   International Journal of Engineering Research & Technology

License:  This work is licensed under a Creative Commons Attribution 4.0 International License.

Website: www.ijert.org

Volume/Issue:   Vol.2 - Issue 1 (January - 2013)

e-ISSN:   2278-0181


To improve the trustworthiness of a host and system data cryptographic verification technique is used. From these approach users keystroke to identify the legitimate user”Ēs to get the service from the server by using integrity verification and malicious traffic detection. But the main issue of this approach is keystroke hacking by the bots or autonomous program. The key logger”Ēs records the user”Ēs password or security code and send to the hacker to login the service when the user is no longer online. This project aims to propose a malware detection approach based on the characteristic behaviour of human user”Ēs. Finally explore the human-bots differences by using TUBA (Telling hUman and Bots Apart) thereby prevent bots forgeries. By using classifier algorithm the current work identify the human and malware activities.


Number of Citations for this article:  Data not Available


Key Word(s):    


Number of Downloads:     1317

Call for Papers - May - 2017



                 Call for Thesis - 2017 

     Publish your Ph.D/Master's Thesis Online

              Publish Ph.D Master Thesis Online as Book