Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Kibe, Ann
- Classification and Analysis of Techniques Applied in Intrusion Detection Systems
Abstract Views :156 |
PDF Views:0
Authors
Affiliations
1 Department of Information Technology, Jomo Kenyatta University of Agriculture and Technology (JKUAT), KE
1 Department of Information Technology, Jomo Kenyatta University of Agriculture and Technology (JKUAT), KE
Source
International Journal of Scientific Engineering and Technology, Vol 6, No 7 (2017), Pagination: 216-219Abstract
Currently, the development of most of organizations depends on technology for mining information, storing and its transactions. But these frequent use online technologies make the data to be exposed to the risk of attacks that compromise the normal activities of systems. To protect and prevent these attacks, the researchers had implemented the intrusion detection systems (IDS). Even the IDS are so many, the attacks still also increasing in different forms. This paper reviews most techniques usable in IDS, to help users and security professionals to take robust measures in identifying the strength and weakness of each technique. The result of this study shows that majority of techniques perform well at rate more than 99%.Keywords
Data Mining, IDS, Normalization.- Secure Authentication for Online Banking against Man-In-The-Browser Attack Using Least Significant Bit Embeddings
Abstract Views :125 |
PDF Views:0
Authors
Affiliations
1 School of Computer Science and Information Technology, Department of Computing, Jomo Kenyatta University of Agriculture and Technology, KE
1 School of Computer Science and Information Technology, Department of Computing, Jomo Kenyatta University of Agriculture and Technology, KE
Source
International Journal of Scientific Engineering and Technology, Vol 5, No 9 (2016), Pagination: 430-432Abstract
MitB attacks are a sophisticated new hacking technique associated with Internet crime, especially that which targets customers of Internet banking and operate by stealing authentication data and altering legitimate user transactions to benefit the attackers. This paper presents LSB embeddings approach for enhancing user authentication during an online transaction to tackle the problem of MitB attack.Keywords
Man-In-The-Browser, Authentication, Online Banking, LSB Embedding.- Use of Enhanced Transparent Data Encryption to Protect Database Against Exposure of Backup Data
Abstract Views :150 |
PDF Views:0
Authors
Affiliations
1 Jomo Kenyatta University of Agriculture and Technology, Kigali Campus, RW
1 Jomo Kenyatta University of Agriculture and Technology, Kigali Campus, RW