A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Chatterjee, Madhumita
- TabSecure: An Anti-Phishing Solution with Protection against Tabnabbing
Authors
1 Computer Engg., PIIT, New Panvel, Mumbai University, IN
Source
International Journal of Computer Networks and Applications, Vol 3, No 3 (2016), Pagination: 63-69Abstract
With an upsurge in the use of internet, there are various attacks being launched every day. These attacks target the vulnerabilities of various computer resources, such as, the operating system, web browsers, toolbars, etc. along with the susceptibility of the users due to lack of awareness about the possible scams. The existing solutions suffer various drawbacks. The website phishing solutions fail when JavaScript is used in the webpage. The email phishing solution propose use of a special web browser instead of the existing popular ones, in order to secure the user from phishing emails. The tabnabbing solutions follow visual cues which are prone to false negatives. The proposed approach aims to resolve these issues and provides a solution to phishing through websites, email phishing and tabnabbing using web browser monitor and an email phishing detection module that uses Bayesian classifier, but in a way different from the way it was used in a solution proposed earlier. The system keeps sending popups to the user until the user closes the phishing page detected by the system, hence reducing the chance of the user getting masqueraded.Keywords
Phishing, Tabnabbing, Browser Monitor, Deceptive Phishing.- Optimized Firewall with Traffic Awareness
Authors
1 Computer Department, PIIT, Mumbai University, IN
Source
International Journal of Computer Networks and Applications, Vol 3, No 2 (2016), Pagination: 32-37Abstract
Firewall is one of the well known network-based security devices that have been widely used since the initial days of computer network security. Firewall is designed to allow or reject network traffic depending on firewall rules that displays the types of packets should be accepted or rejected in protected network. Currently growth complexity in network is high and it's very common to find firewall policies consisting of many rules.
Packet filtering is the one of the major contemporary firewall design techniques. An important design goal is to arrive at the decision at the packet only [1]. Firewall access rule list consists of rules which are sequentially checked. This implies that firewall filtering overhead and costing will be higher when the order of the matching rules is higher. Hence it is vital, to minimize the filtering overhead. It's critical to have necessary ordering of rules in the firewall rule set. Firewall validates all inbound and outbound packets by analyzing data packet and then by comparing packets with many firewall rules, that defines whether to accept or discard the traffic. It is very important to improve the firewall policies to improve performance of network.
Keywords
Firewall, Security, Filtering, Traffic.- A Novel Efficient Rebroadcast Protocol for Minimizing Routing Overhead in Mobile Ad-Hoc Networks
Authors
1 Department of Information Technology, PIIT, Mumbai University, IN