Survey on Identification of Hacker by Trapping Mechanism
Journal Title: International Journal of Trend in Scientific Research and Development - Year 2018, Vol 2, Issue 3
Abstract
Advanced persistence threat (APT) attack is to steal data rather than to cause damage to the network or organization. It is one of the initial phases in successful hacking of a system. Here, users behaviour is analysed based on previous behaviour such as posted data, time of posting, IP address and location of usage of social network. This system includes two processes. The Social network accounts are analysed, tracked and then detected. If the hacker attacks the original users account, then the system allows the attacker to proceed further until our system captures all the important information about the attacker by directing the hacker to the fake website. The system generates Honeywords based on the user information provided and the original password is converted into another format and stored along with the honeywords. Attacker who knows the E-mail account of original user can easily reset the password of the cloud server. When the attacker tries to login into the purchase portal, he/she is tracked and allowed to do purchase. Server identifies the attacker and sends an alert message to the owner and blocks the attacker from doing transaction from his original account. C. Ramprasath | J. Varun | Ms S. SriHeera"Survey on Identification of Hacker by Trapping Mechanism" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd10789.pdf http://www.ijtsrd.com/computer-science/computer-security/10789/survey-on-identification-of-hacker-by-trapping-mechanism/c-ramprasath
Fun with Flutter
Cross platform mobile application development is that the pressing priority in today’s world and generation. Developers are implemented to either construct an equivalent application various times for varied OS operating...
Analysis of Budget Realization to Assess the Effectiveness and Efficiency of Performance in the Department of Tourism and Culture of Gowa Regency, South Sulawesi
This study aims to assess the effectiveness and efficiency of the performance of the regional government of the Gowa Regency Tourism and Culture Office in 2017 2019. The types of data used in this research are qualitativ...
The Current Situation, Problems and Countermeasures of China E Commerce Credit System Construction
The sustainable and healthy development of the e commerce industry cannot be guaranteed without a perfect credit system. Certain achievements have been made in laws, regulations and policies in the construction of our co...
Study of Rotation Measurements with a Passive Resonant Gyroscope Based on Hollow Core Fiber
We present rotation measurements performed with a passive resonant optical fibre gyroscope. The fibre used to realize the resonant cavity was a Kagome Hollow Core Fiber. Measurements were performed in two types of config...
Novel Promising Algorithm to suppress Spoof Attack by Cryptography Firewall2014
Spoof attack suppression by the biometric information incorporation is the new and modern method ofavoid and as well suppression the attack online as well Off line . Wireless networks provide variousadvantages in real wo...