A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Rana, J. L.
- A Frame Work for Code Injection Attack Investigation in Windows Environment
Authors
1 Department of Computer Science and Engineering, Maulana Azad National Institute of Technology, IN
Source
Networking and Communication Engineering, Vol 2, No 7 (2010), Pagination: 188-194Abstract
Cyber crime committed in web environment is assuming gargantuan proportion. Code injection attack is a type of multi step attack carried out by the suspicious user via entering vulnerable code into the web form or address bar of web browser. An attacker may post an interesting message by injecting malicious JavaScript code through browser entry point which gets stored into vulnerable web site. When a novice end user views the interesting posted message on vulnerable web site containing vulnerable code, his browser executes the malicious script, and his webpage containing session cookies redirected to attacker zone. Investigating Code Injection attacks at the attacker’s environment is a tedious job as the attacker may tamper the evidence after conducting the attack from his environment. In this paper possible Code Injection Attacks in windows environment are presented and new framework is proposed to investigate code injection attack efficiently, which captures attacker’s activities at server side instead of attacker’s environment.
Keywords
Cyber Forensic, Evidence Gathering, Input Attack, Web Server Log.- A Survey on Various Aspects of Quantum Cryptography
Authors
1 Department of Information Technology, Maulana Azad National Institute of Technology, Bhopal-462051, IN
2 CSE Department, Maulana Azad National Institute of Technology, Bhopal-462051, IN
3 Department of CSE, Maulana Azad National Institute of Technology, Bhopal-462051, IN
Source
Networking and Communication Engineering, Vol 2, No 7 (2010), Pagination: 206-212Abstract
In the era of information technology the need for secure communication has become increasingly important. Cryptography is a technology for creating the core of information security we use cryptography for making data secure which is the science of information protection from unauthorized interception and tempering. Most modern cryptographic studies design cryptosystems and algorithms using mathematical concepts which are based either on factorization or on discrete logarithm problem. In recent years quantum information research has lead to the discovery of a number of remarkable new paradigms for information processing and communication. These developments include quantum cryptography schemes that offer unconditionally secure information transport guaranteed by quantum-mechanical laws, which provide protection of system security, and optimization of system efficiency and detects intrusion and wiretap. Today quantum cryptography is used in various application for transferring secure data without the fear of keys being compromised. This paper reviews the various areas where quantum cryptography is successfully implemented, its advantages disadvantages & technical issues.