Security Protection Mechanism for Social Networking Websites Based on Real-Time Proxy
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 10, Issue 3
Abstract
During the last two decades Information technology has grown tremendously and became the main source of knowledge. In past few years the world getting closer and closer this is only because of Social networking websites such as Facebook, Twitter etc. Yet with usefulness and the popularity, the misuse and cybercrime are more evident. So prevention and detection of these threats is become a major challenge To minimize this risk of accessing social networking applications we proposed anapplication. The idea is to integrate many commercial software and online security services into a security module, simultaneously execute webpage security threat scan, then scanthe information sent by the web server with security module before sending to the client. If security threats were found in the web page, the system will add this web page to the blacklist and issue a warning to the client side to prevent attack. Later on, as long as the client is to receive the webpage in the blacklist, a warning will be issued to the client side. Through this mechanism, we can lower the security risk of the clients using social networking websites.
Authors and Affiliations
Komal Navale , Rajendra Pisal , Vishal Suravase , Santosh Reddy
Performance Enhancement of a Novel Interleaved Boost Converter by using a Soft-Switching Technique
In this paper a novel Interleaved Boost Converter (IBC) with soft-switching techniques is proposed. Through the zero-voltage switching (ZVS) and zero-current switching (ZCS) reduces the current stress of the main circuit...
Deterministic Routing in OSPF for Post Single Link Failure
In the Internet, link-state routing protocols, that are commonly deployed tend to converge globally after any of real-time applications. Topological change in the network i.e. news of the change is propagated to all the...
Study of Routing Protocols in Mobile Ad Hoc Networks
Mobile ad hoc networks (MANETs) are rapidly evolving as an important area of mobility. MANETs are infrastructure less autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless...
A Study on Educational Data Mining
Educational Data Mining is an emerging discipline, concerned with developing methods for exploring the unique types of data that come from educational settings, and using those methods to better understand students, and...
New Julia and Mandelbrot Sets for Jungck Ishikawa Iterates
The generation of fractals and study of the dynamics of polynomials is one of the emerging and interesting field of research nowadays. We introduce in this paper the dynamics of polynomials z n - z + c = 0 for n 2 and ap...