Efficient User Authentication and Providing Host Security against Malware

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 5

Abstract

To improve the trustworthiness of a host and system data cryptographic verification technique is used. From these approach users keystroke to identify the legitimate user’s to get the service from the server by using integrity verification and malicious traffic detection. But the main issue of this approach is keystroke hacking by the bots or autonomous program. The key logger’s records the user’s password or security code and send to the hacker to login the service when the user is no longer online. This project aims to propose a malware detection approach based on the characteristic behaviour of human user’s. Finally explore the human-bots differences by using TUBA (Telling hUman and Bots Apart) thereby prevent bots forgeries. By using classifier algorithm the current work identify the human and malware activities.

Authors and Affiliations

P. Angel , V. Sindhu Shri

Keywords

Related Articles

Reducing Binding update in NEMO Supported PMIPV6

Proxy Mobile IPV6 (PMIPV6) is a network-based mobility management protocol,designed to keep track of individual mobile node’s mobility. Numerous research works are in progress to enhance functionality of PMIPV6 to suppor...

Analysis of Job Scheduling Algorithms in Cloud Computing

Cloud computing is flourishing day by day and it will continue in developing phase until computers and internet era is in existence. While dealing with cloud computing, a number of issues are confronted like heavy load o...

An Estimation Method of Measuring Image Quality for Compressed Images of Human Face

Nowadays digital image compression and decompression techniques are very much important. So our aim is to calculate the quality of face and other regions of the compressed image with respect to the original image. Image...

Survey of Spatial Approximate String Search

Several applications require finding objects closest to a specified location that contains a set of keywords. In view of example, online yellow pages allow users to specify an address and a set of keywords. In response,...

A Comparative study Between Fuzzy Clustering Algorithm and Hard Clustering Algorithm

Data clustering is an important area of data mining. This is an unsupervised study where data of similar types are put into one cluster while data of another types are put into different cluster. Fuzzy C means is a very...

Download PDF file
  • EP ID EP121286
  • DOI -
  • Views 104
  • Downloads 0

How To Cite

P. Angel, V. Sindhu Shri (2014). Efficient User Authentication and Providing Host Security against Malware. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 9(5), 255-259. https://europub.co.uk/articles/-A-121286