IJERT-EMS
IJERT-EMS

Cryptographic Provenance Verification For Secure Hosts


Cryptographic Provenance Verification For Secure Hosts
Authors : P .Angel, S. Hemalatha
Publication Date: 30-01-2013

Authors

Author(s):  P .Angel, S. Hemalatha

Published in:   International Journal of Engineering Research & Technology

License:  This work is licensed under a Creative Commons Attribution 4.0 International License.

Website: www.ijert.org

Volume/Issue:   Vol.2 - Issue 1 (January - 2013)

e-ISSN:   2278-0181

Abstract

To improve the trustworthiness of a host and system data cryptographic verification technique is used. From these approach users keystroke to identify the legitimate user”Ēs to get the service from the server by using integrity verification and malicious traffic detection. But the main issue of this approach is keystroke hacking by the bots or autonomous program. The key logger”Ēs records the user”Ēs password or security code and send to the hacker to login the service when the user is no longer online. This project aims to propose a malware detection approach based on the characteristic behaviour of human user”Ēs. Finally explore the human-bots differences by using TUBA (Telling hUman and Bots Apart) thereby prevent bots forgeries. By using classifier algorithm the current work identify the human and malware activities.

Citations

Number of Citations for this article:  Data not Available

Keywords

Key Word(s):    

Downloads

Number of Downloads:     1307
Similar-Paper

High Impact & Top Rated International Journal

        Call for Papers - April - 2017   

        

 

                 Call for Thesis - 2017 

     Publish your Ph.D/Master's Thesis Online

              Publish Ph.D Master Thesis Online as Book