Security Protection Mechanism for Social Networking Websites Based on Real-Time Proxy
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 10, Issue 3
Abstract
During the last two decades Information technology has grown tremendously and became the main source of knowledge. In past few years the world getting closer and closer this is only because of Social networking websites such as Facebook, Twitter etc. Yet with usefulness and the popularity, the misuse and cybercrime are more evident. So prevention and detection of these threats is become a major challenge To minimize this risk of accessing social networking applications we proposed anapplication. The idea is to integrate many commercial software and online security services into a security module, simultaneously execute webpage security threat scan, then scanthe information sent by the web server with security module before sending to the client. If security threats were found in the web page, the system will add this web page to the blacklist and issue a warning to the client side to prevent attack. Later on, as long as the client is to receive the webpage in the blacklist, a warning will be issued to the client side. Through this mechanism, we can lower the security risk of the clients using social networking websites.
Authors and Affiliations
Komal Navale , Rajendra Pisal , Vishal Suravase , Santosh Reddy
Novel Design and Implementation of Topology and Orchestration Specification for Cloud Applications to enable Portability
In this paper we provide a novel design and implementation of toplogy and orchestration specification for cloud applications to enable portability
Information Extraction using Incremental Approach
Data mining is playing vital role in text extraction as now a day’s large amount of data available in scientific research, biomedical literature and web data. Data retrieval using existing approaches use sequential appro...
Survey on End-To-End Confidentiality in Wireless Sensor Networks
A wireless sensor network (WSN) is a collection of a large number of sensor nodes and few sink nodes that have limited Computation, communication and power resources. Data aggregation is used to reduce amount of data tra...
A Novel Routing Protocol for Providing Anonymity in MANET
Mobile Ad Hoc Networks (MANETs) using anonymous routing protocols hidden node identity and external routes having anonymity protection. Anonymous routing protocols use either hop-by-by hop encryption or redundant traffic...
Statistical Anomaly Detection Technique for Real Time Datasets
Data mining is the technique of discovering patterns among data to analyze patterns or decision making predictions. Anomaly detection is the technique of identifying occurrences that deviate immensely from the large a...