Security Protection Mechanism for Social Networking Websites Based on Real-Time Proxy
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 10, Issue 3
Abstract
During the last two decades Information technology has grown tremendously and became the main source of knowledge. In past few years the world getting closer and closer this is only because of Social networking websites such as Facebook, Twitter etc. Yet with usefulness and the popularity, the misuse and cybercrime are more evident. So prevention and detection of these threats is become a major challenge To minimize this risk of accessing social networking applications we proposed anapplication. The idea is to integrate many commercial software and online security services into a security module, simultaneously execute webpage security threat scan, then scanthe information sent by the web server with security module before sending to the client. If security threats were found in the web page, the system will add this web page to the blacklist and issue a warning to the client side to prevent attack. Later on, as long as the client is to receive the webpage in the blacklist, a warning will be issued to the client side. Through this mechanism, we can lower the security risk of the clients using social networking websites.
Authors and Affiliations
Komal Navale , Rajendra Pisal , Vishal Suravase , Santosh Reddy
Proficient And Protected Content Dispensation In Distributed Environment To Client Proxy-Based Transcoding Approach
Currently internet client varies widely both in hardware and software properties. The ever increasing requirements of clients to support heterogeneous environment, demand techniques to adapt the same content to diverse d...
Analysis on Credit Card Fraud Detection Methods
Due to the theatrical increase of fraud which results in loss of dollars worldwide each year, several modern techniques in detecting fraud are persistently evolved and applied to many business fields. Fraud detection inv...
Deriving the Probability with Machine Learning and Efficient Duplicate Detection in Hierarchical Objects
Duplicate detection is the major important task in the data mining, in order to find duplicate in the original data as well as data object. It exactly identifies whether the given data is duplicates or not. Real world du...
Distributed Observer Design for Leader following Control of Multi-Agent System with Pinning Technique
This paper is concerned with a leader–follower problem for a multi-agent system designed by the pinning control technique without assuming that the interaction graph is connected. Distributed observers are designed for t...
Secure and Faster NN Queries on Outsourced Metric Data Assets
Cloud computing enables outsourcing of data in pay per use fashion. This will help data owners to have services of storage without the need for investment. However, they have security concerns as the cloud service provid...