SlideShare a Scribd company logo
1 of 3
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 2764
THE HIDDEN VIRUS PROPAGATION SEARCH ENGINE ATTACK
Aswini.V1, Meena.S2, Vinmathi .M.S3
1,2 Student Member, Dept. of CSE, Panimalar Engineering college, Tamil Nadu, India
3Associate Professor, Dept. of CSE, Panimalar Engineering college, Tamil Nadu, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Many real-world networks exhibit overlapping
community structure in which vertices may belong to more
than one community. We classify vertices intooverlappingand
non-overlapping ones, and investigate indetailhowtheyaffect
epidemic spreading respectively. One of the important
dynamics on complex networks is epidemic spreading. An
important issue is, for a given community structureofcomplex
network, how the infection propagatesandwhetherthereexist
effective control strategies for preventing or suppressing the
spread of infection. When an epidemic spreadsinapopulation,
individuals may adaptively change the structureoftheirsocial
contact network to reduce risk of infection. Here we study the
spread of an epidemic on an adaptive network with
community structure. In a static network, weakly connected
heterogeneous communities can have significantly different
infection levels. In contrast, adaptation promotes similar
infection levels and alters the network structure so that
communities have more similar average degrees.
Key Words: Epidemic spreading, infection propagation,
infection level, average degree.
1. INTRODUCTION
The current research on network virus propagation can be
divided into two categories: some researchers model the
propagation of virus to find the threshold of a large-scale
breakout, while others attempt to study the mechanism of a
restraining virus. In the study of virus defense in the mobile
network, it is found that virus propagation in a mobile
network is difficult to restrain because the topology of the
network is changing frequently due to the mobility of
devices. There are two kinds of strategies restraining the
virus in a mobile network: immunization strategy and local
strategy. In most cases, immunization strategies are
implemented based on centralized distribution and static
network. Within a group, each member is directlyconnected
to most other members, but connections among different
groups are relatively rare. In some degree, structure
determines the characteristics and function of networks. To
explain the mechanism of social networks, several models
have been presented, which include the mutual friendship
approach, dense links in community and sparse links
between communities. Computer worms, which have been
rampant in the Internet for more than two decades, are
nothing new to us. Bluetooth wormssignificantlydifferfrom
Internet worms in three ways. First, thelimitedtransmission
range of a Bluetooth device leads to a proximity-based
infection mechanism: a Bluetooth-enabled devicecontrolled
by the worm can only infect neighborswithinitsradiorange.
This differs from Internet worms that often scan the entire
IP address space for susceptible victims. Second, the
bandwidth available to Bluetooth devices is usually much
narrower than those of Internet links. For instance, the
maximum transmission rate of a device operating on the
class 2 Bluetooth radio is 1 Mbps. The input parameters fed
to this model include some key statistical metrics that
describe the underlying mobility patterns, such as average
node degree, average node meeting rate, and the link
duration distribution. The input parameters of the model
also include control parameters used by the Bluetooth
worms, such as how much time the Bluetooth worm spends
at most on discovering new victimsand how many victimsit
expects to discover within a single infection cycle, and how
long the Bluetooth worm remains dormant before it is
activated again for new infection attempts.
Problem Definition
In the traditional view, viruses cannot spread among
unconnected nodes or communities. But in fact, virus
propagation can occur among globalusersorcommunitiesin
social networks through search engines, regardless of the
connectivity of nodes and communities. We call this
phenomenon the propagation wormhole effect. The
propagation wormhole effect is the specific manifestationof
the hidden power of search engines on virus propagation. A
primary challenge for analysing the viruspropagation effect
of search engines lies in figuring out the processes by which
a search engine increases the number of infection sources
and the infection routes. Emotion categories, namely, awe,
amusement, contentment excitement, anger, disgust,
sadness, fear and boredom. Then, we investigate whether
user demographics such as gender, marital status and
occupation are related to the emotional tagsofsocialimages.
We uncover several patterns, and a partially labelled factor
graph model named the demographics factor graph model
(D-FGM) is proposed to leverage user demographics in the
modelling as different factors.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 2765
Architecture Diagram
MODULES:
SEARCH ENGINE MODULE
In this module the user login to the application and use
search engine to search any content of dataintheapplication
to get the required data with respective to the keywords
entered in the search engine.
UNOFFICIAL URL BLINK MODULE
The user click the unofficial links and get access the data
along with virus which get affected along with the retrieval
of data then application sends the notification to the admin
for the virus detection.
VIRUS PROPAGATION ANALYSATION MODULE
Admin analysis the gets details of malicious virus and uses
search engine to analysis the path of virus to analysis the
propagation of virus content in each nodes and analysis
percentage of affected nodes at each path.
FEEDBACK MODEL WITH TIME DELAY
Overview of Time Delay
In a communications system, propagation delay referstothe
time lag between the departure of a signal from the source
and the arrival of the signal at the destination.Thiscanrange
from a few nanoseconds or microseconds in local area
networks (LANs) up to about 0.25 singeostationary-satellite
communications systems. Additional propagationdelayscan
occur as a result of the time required for packets to make
their way through land-based cables and nodes of the
Internet. Hold time is also a timing parameter associated
with Flip Flops and all other sequential devices. The Hold
time is used to further satisfy the minimum pulse width
requirement for the first (Master) latch that makes up a flip
flop. The input must not change until enough time has
passed after the clock tick to guarantee the master latch is
fully disabled. More simply, hold time is the amount of time
that an input signal (to a sequential device) must be stable
(unchanging) after the clock tick in order to guarantee
minimum pulse width and thus avoid possible met stability.
Propagation delay of a logic gate is defined as the time it
takes for the effect of change in input to be visible at the
output. In other words, propagation delay is the time
required for the input to be propagated to the output.
Normally, it is defined as the difference between the times
when the transitioning input reaches50%ofitsfinalvalueto
the time when the output reaches 50% of the final value
showing the effect of input change. Here, 50% is the defined
as the logic threshold where output (or, in particular, any
signal) is assumed to switch its states. Liberty file contains a
lookup table for the each input-to-output path (alsocalledas
cell arc) for logic gates as .lib models. The table contains
values for different input transition times and output loads
corresponding to cell delay. Depending upon the input
transition and output load that is present in the design for
the logic gate under consideration, physical design tools
interpolate between these valuesand calculatethecelldelay.
FLOWCHART
RELATED WORKS
There are several important parametersin ourmodelforthe
derivation of the infection rate _ that require careful
evaluation for the propagation model to achieve the desired
accuracy. For MICA2 motes, the maximum packet
transmission rate is around 36 packets/secondwithapacket
size of 32 bytes. This results in a packet transmission timeof
0.027 second. The average packet loss rate due to effects
such as packet collisions, etc., is assumed to lie between 0.1
and 0.2 which is the average value derived from simulation
data. Thus, in our formulation, l ¼ 0:1 and Tpkt ¼ 0:027
second. Simulation results of Deluge [11] have shown that
the average number of requests for acquiring a page
E½Nreq_ is approximately equalto5.4.Oursimulationworks
in two phases. In the first phase, we form the networkwhere
each node identifies its set of neighbors and entries are
made into a neighbor table. By randomly choosing links to
keep or delete, we control the average degree of the
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 2766
network. We perform this by modifying the transmit power
of individual nodes so as to change the average number of
total links in the network. The entry for each node in the
neighborhood table can indicate whether a node is
susceptible, infected, or recovered.Weoutlinethesimulation
setup and detail to implement the propagation process in
each of the three broadcast protocols. The time dynamics of
the malware spread is captured with varying degrees of
infectivity on the whole network. We have usedJProwler[4],
a probabilistic, event-driven wireless network simulator in
Java, for our experiments.
CONCLUSION
With the proliferation of social networks and their ever
increasing use, viruses have become much more prevalent.
We investigate the propagation effect of search engines,
and characterize the positive feedback effect and the
propagation wormhole effect. The virtual virus pool and
virtual infection paths that are formed by a search engine
make propagation take place much more quickly. We show
that propagation velocity is quicker, infection density is
larger, the epidemic threshold is lower and the basic
reproduction number is greater in the presence of a search
engine. Finally, we conduct experiments that verify the
propagation effect in terms of both infection density and
virus propagation velocity. Results show the significant
influence of a search engine particularly its ability to
accelerate virus propagation in social networks.
Broadcast protocols in sensor networks are vulnerable as
potential carriers of malwares/viruses that spread over air
interfaces. In this paper, we have provided a common
mathematical model to analyze the process of malware
propagation over different multichip broadcast protocols,
although approximately, our model successfullycapturesthe
ripple-based propagation behavior of the wave front of a
broadcast protocol. Not only is the model capable of
assessing the performance of each protocol in the face of a
virus outbreak, but it also helps in comparing their
vulnerabilities against each other. Its generic and flexible
nature allows us to conveniently fit parameters of different
broadcast protocols and analyze their susceptibilities.
Despite the similarities in operation between some of the
protocols discussed, the epidemic model successfully
highlights their differences from a propagation standpoint.
REFERENCE
[1] S. Wen, W. Zhou, J. Zhang, Y. Xiang, W. Zhou, W. Jia,
and C. C. Zou, “Modeling and analysis on the propagation
dynamics of modern email malware,” IEEE Trans.
Dependable Sec. Computer., vol. 11, no.4,pp.361–374,2014.
[2]J. Zhang and Z. Jin, “Epidemic spreading on complex
networks with community structure,” Applied Mathematics
and Computation, vol. 219, no. 6, pp. 2829–2838, 2012.
[3] C. Fu, Q. Huang, L. Han, L. Shen, and X. Liu, “Virus
propagation power of the dynamic network,” EURASIP J.
Wireless Comm. AndNetworking, vol. 2013, p. 210, 2013.
[4] L. Lu, R. Perdisci, and W. Lee, “SURF: detecting and
measuringsearch poisoning,” in Proceedingsofthe18thACM
Conference onComputer and Communications Security,CCS,
Chicago, Illinois, USA,October 17-21, 2011, pp. 467 476.
[5] H. W. S. Herbert W. Hethcote and P. V. D. Driessche,
“Nonlinearoscillations in epidemic models,” Society for
Industrial and AppliedMathematics, vol. 40, no. 1, pp. 1 9,
2006.
[6] Y. Zhou and X. Jiang, “Dissecting android malware:
Characterizationand evolution,” in IEEE Symposium on
Security and Privacy,SP, 21-23 May, San Francisco,
California, USA, 2012, pp. 95–109.
[7] K. Aoki, T. Yagi, M. Iwamura, and M. Itoh,
“Controlling malwareHTTP communications in dynamic
analysis system using search engine,” in CSS, 2011, pp. 1–6
[8] J. Shang, L. Liu, F. Xie, and C. Wu, “How overlapping
community structure affects epidemic spreading incomplex
networks,” in IEEE 38th Annual Computer Software and
Applications Conference,COMPSAC Workshops, Vasteras,
Sweden, July 21-25, 2014, pp. 240– 245.
[9] I. Tunc and L. B. Shaw, “Effects of community
structure on epidemic spread in an adaptivenetwork,”CoRR,
vol. abs/1212.3229, 2012.
[10] J. T. Jackson and S. Creese, “Virus propagation in
heterogeneousBluetooth networkswith human behaviors,”
IEEE Trans. Dependable Sec. Comput., vol. 9, no. 6, pp. 930–
943, 2012.

More Related Content

What's hot

IRJET- Secure Data Transmission from Malicious Attacks: A Review
IRJET-  	  Secure Data Transmission from Malicious Attacks: A ReviewIRJET-  	  Secure Data Transmission from Malicious Attacks: A Review
IRJET- Secure Data Transmission from Malicious Attacks: A ReviewIRJET Journal
 
Wormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsWormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsPvrtechnologies Nellore
 
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANETPDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANETijsptm
 
Fault Link Detection in WSN using Link Scanner Approach
Fault Link Detection in WSN using Link Scanner ApproachFault Link Detection in WSN using Link Scanner Approach
Fault Link Detection in WSN using Link Scanner ApproachIRJET Journal
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...IRJET Journal
 
Pre-filters in-transit malware packets detection in the network
Pre-filters in-transit malware packets detection in the networkPre-filters in-transit malware packets detection in the network
Pre-filters in-transit malware packets detection in the networkTELKOMNIKA JOURNAL
 
Wormhole attack detection algorithms
Wormhole attack detection algorithmsWormhole attack detection algorithms
Wormhole attack detection algorithmskitechsolutions
 
Machine Learning Techniques Used for the Detection and Analysis of Modern Typ...
Machine Learning Techniques Used for the Detection and Analysis of Modern Typ...Machine Learning Techniques Used for the Detection and Analysis of Modern Typ...
Machine Learning Techniques Used for the Detection and Analysis of Modern Typ...IRJET Journal
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysisijceronline
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...
Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...
Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...IRJET Journal
 
Environment based secure transfer of data in wireless sensor networks
Environment based secure transfer of data in wireless sensor networksEnvironment based secure transfer of data in wireless sensor networks
Environment based secure transfer of data in wireless sensor networksijsptm
 
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACKPERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACKIJCNCJournal
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...ijp2p
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...IEEEGLOBALSOFTTECHNOLOGIES
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 

What's hot (17)

IRJET- Secure Data Transmission from Malicious Attacks: A Review
IRJET-  	  Secure Data Transmission from Malicious Attacks: A ReviewIRJET-  	  Secure Data Transmission from Malicious Attacks: A Review
IRJET- Secure Data Transmission from Malicious Attacks: A Review
 
Wormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsWormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systems
 
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANETPDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
 
Fault Link Detection in WSN using Link Scanner Approach
Fault Link Detection in WSN using Link Scanner ApproachFault Link Detection in WSN using Link Scanner Approach
Fault Link Detection in WSN using Link Scanner Approach
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
 
Pre-filters in-transit malware packets detection in the network
Pre-filters in-transit malware packets detection in the networkPre-filters in-transit malware packets detection in the network
Pre-filters in-transit malware packets detection in the network
 
Wormhole attack detection algorithms
Wormhole attack detection algorithmsWormhole attack detection algorithms
Wormhole attack detection algorithms
 
Machine Learning Techniques Used for the Detection and Analysis of Modern Typ...
Machine Learning Techniques Used for the Detection and Analysis of Modern Typ...Machine Learning Techniques Used for the Detection and Analysis of Modern Typ...
Machine Learning Techniques Used for the Detection and Analysis of Modern Typ...
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...
Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...
Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...
 
Environment based secure transfer of data in wireless sensor networks
Environment based secure transfer of data in wireless sensor networksEnvironment based secure transfer of data in wireless sensor networks
Environment based secure transfer of data in wireless sensor networks
 
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACKPERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
 
A43030104
A43030104A43030104
A43030104
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 

Similar to IRJET- The Hidden Virus Propagation Search Engine Attack

Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over NetworkingCrypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over NetworkingIRJET Journal
 
Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...eSAT Publishing House
 
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...IJNSA Journal
 
Prevention against new cell counting attack against tor network
Prevention against new cell counting attack against tor networkPrevention against new cell counting attack against tor network
Prevention against new cell counting attack against tor networkeSAT Journals
 
Prevention against new cell counting attack against tor network
Prevention against new cell counting attack against tor networkPrevention against new cell counting attack against tor network
Prevention against new cell counting attack against tor networkeSAT Publishing House
 
Indexing Building Evaluation Criteria
Indexing Building Evaluation CriteriaIndexing Building Evaluation Criteria
Indexing Building Evaluation CriteriaIJERA Editor
 
Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...
Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...
Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...IRJET Journal
 
Survey on Security Aspects Related to DOIP
Survey on Security Aspects Related to DOIPSurvey on Security Aspects Related to DOIP
Survey on Security Aspects Related to DOIPIRJET Journal
 
A secure routing process to simultaneously defend against false report and wo...
A secure routing process to simultaneously defend against false report and wo...A secure routing process to simultaneously defend against false report and wo...
A secure routing process to simultaneously defend against false report and wo...ieijjournal
 
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET Journal
 
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed ServersIRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed ServersIRJET Journal
 
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...IJNSA Journal
 
A Survey on Secured Routing In AD HOC Networks for Various Attacks
A Survey on Secured Routing In AD HOC Networks for Various AttacksA Survey on Secured Routing In AD HOC Networks for Various Attacks
A Survey on Secured Routing In AD HOC Networks for Various AttacksIRJET Journal
 
Self Adaptive Automatch Protocol for Batch Identification Mechanism in Wirele...
Self Adaptive Automatch Protocol for Batch Identification Mechanism in Wirele...Self Adaptive Automatch Protocol for Batch Identification Mechanism in Wirele...
Self Adaptive Automatch Protocol for Batch Identification Mechanism in Wirele...IRJET Journal
 
IRJET- Hashxplorer-A Distributed System for Hash Matching
IRJET- Hashxplorer-A Distributed System for Hash MatchingIRJET- Hashxplorer-A Distributed System for Hash Matching
IRJET- Hashxplorer-A Distributed System for Hash MatchingIRJET Journal
 
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...CSCJournals
 

Similar to IRJET- The Hidden Virus Propagation Search Engine Attack (20)

1426742816
14267428161426742816
1426742816
 
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over NetworkingCrypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
 
Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...
 
A05510105
A05510105A05510105
A05510105
 
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...
 
Prevention against new cell counting attack against tor network
Prevention against new cell counting attack against tor networkPrevention against new cell counting attack against tor network
Prevention against new cell counting attack against tor network
 
Prevention against new cell counting attack against tor network
Prevention against new cell counting attack against tor networkPrevention against new cell counting attack against tor network
Prevention against new cell counting attack against tor network
 
Indexing Building Evaluation Criteria
Indexing Building Evaluation CriteriaIndexing Building Evaluation Criteria
Indexing Building Evaluation Criteria
 
Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...
Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...
Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...
 
Survey on Security Aspects Related to DOIP
Survey on Security Aspects Related to DOIPSurvey on Security Aspects Related to DOIP
Survey on Security Aspects Related to DOIP
 
A secure routing process to simultaneously defend against false report and wo...
A secure routing process to simultaneously defend against false report and wo...A secure routing process to simultaneously defend against false report and wo...
A secure routing process to simultaneously defend against false report and wo...
 
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
 
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed ServersIRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
 
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...
 
A Survey on Secured Routing In AD HOC Networks for Various Attacks
A Survey on Secured Routing In AD HOC Networks for Various AttacksA Survey on Secured Routing In AD HOC Networks for Various Attacks
A Survey on Secured Routing In AD HOC Networks for Various Attacks
 
Self Adaptive Automatch Protocol for Batch Identification Mechanism in Wirele...
Self Adaptive Automatch Protocol for Batch Identification Mechanism in Wirele...Self Adaptive Automatch Protocol for Batch Identification Mechanism in Wirele...
Self Adaptive Automatch Protocol for Batch Identification Mechanism in Wirele...
 
Ii3415521555
Ii3415521555Ii3415521555
Ii3415521555
 
7 ijcse-01229
7 ijcse-012297 ijcse-01229
7 ijcse-01229
 
IRJET- Hashxplorer-A Distributed System for Hash Matching
IRJET- Hashxplorer-A Distributed System for Hash MatchingIRJET- Hashxplorer-A Distributed System for Hash Matching
IRJET- Hashxplorer-A Distributed System for Hash Matching
 
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 

Recently uploaded (20)

IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 

IRJET- The Hidden Virus Propagation Search Engine Attack

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 2764 THE HIDDEN VIRUS PROPAGATION SEARCH ENGINE ATTACK Aswini.V1, Meena.S2, Vinmathi .M.S3 1,2 Student Member, Dept. of CSE, Panimalar Engineering college, Tamil Nadu, India 3Associate Professor, Dept. of CSE, Panimalar Engineering college, Tamil Nadu, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Many real-world networks exhibit overlapping community structure in which vertices may belong to more than one community. We classify vertices intooverlappingand non-overlapping ones, and investigate indetailhowtheyaffect epidemic spreading respectively. One of the important dynamics on complex networks is epidemic spreading. An important issue is, for a given community structureofcomplex network, how the infection propagatesandwhetherthereexist effective control strategies for preventing or suppressing the spread of infection. When an epidemic spreadsinapopulation, individuals may adaptively change the structureoftheirsocial contact network to reduce risk of infection. Here we study the spread of an epidemic on an adaptive network with community structure. In a static network, weakly connected heterogeneous communities can have significantly different infection levels. In contrast, adaptation promotes similar infection levels and alters the network structure so that communities have more similar average degrees. Key Words: Epidemic spreading, infection propagation, infection level, average degree. 1. INTRODUCTION The current research on network virus propagation can be divided into two categories: some researchers model the propagation of virus to find the threshold of a large-scale breakout, while others attempt to study the mechanism of a restraining virus. In the study of virus defense in the mobile network, it is found that virus propagation in a mobile network is difficult to restrain because the topology of the network is changing frequently due to the mobility of devices. There are two kinds of strategies restraining the virus in a mobile network: immunization strategy and local strategy. In most cases, immunization strategies are implemented based on centralized distribution and static network. Within a group, each member is directlyconnected to most other members, but connections among different groups are relatively rare. In some degree, structure determines the characteristics and function of networks. To explain the mechanism of social networks, several models have been presented, which include the mutual friendship approach, dense links in community and sparse links between communities. Computer worms, which have been rampant in the Internet for more than two decades, are nothing new to us. Bluetooth wormssignificantlydifferfrom Internet worms in three ways. First, thelimitedtransmission range of a Bluetooth device leads to a proximity-based infection mechanism: a Bluetooth-enabled devicecontrolled by the worm can only infect neighborswithinitsradiorange. This differs from Internet worms that often scan the entire IP address space for susceptible victims. Second, the bandwidth available to Bluetooth devices is usually much narrower than those of Internet links. For instance, the maximum transmission rate of a device operating on the class 2 Bluetooth radio is 1 Mbps. The input parameters fed to this model include some key statistical metrics that describe the underlying mobility patterns, such as average node degree, average node meeting rate, and the link duration distribution. The input parameters of the model also include control parameters used by the Bluetooth worms, such as how much time the Bluetooth worm spends at most on discovering new victimsand how many victimsit expects to discover within a single infection cycle, and how long the Bluetooth worm remains dormant before it is activated again for new infection attempts. Problem Definition In the traditional view, viruses cannot spread among unconnected nodes or communities. But in fact, virus propagation can occur among globalusersorcommunitiesin social networks through search engines, regardless of the connectivity of nodes and communities. We call this phenomenon the propagation wormhole effect. The propagation wormhole effect is the specific manifestationof the hidden power of search engines on virus propagation. A primary challenge for analysing the viruspropagation effect of search engines lies in figuring out the processes by which a search engine increases the number of infection sources and the infection routes. Emotion categories, namely, awe, amusement, contentment excitement, anger, disgust, sadness, fear and boredom. Then, we investigate whether user demographics such as gender, marital status and occupation are related to the emotional tagsofsocialimages. We uncover several patterns, and a partially labelled factor graph model named the demographics factor graph model (D-FGM) is proposed to leverage user demographics in the modelling as different factors.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 2765 Architecture Diagram MODULES: SEARCH ENGINE MODULE In this module the user login to the application and use search engine to search any content of dataintheapplication to get the required data with respective to the keywords entered in the search engine. UNOFFICIAL URL BLINK MODULE The user click the unofficial links and get access the data along with virus which get affected along with the retrieval of data then application sends the notification to the admin for the virus detection. VIRUS PROPAGATION ANALYSATION MODULE Admin analysis the gets details of malicious virus and uses search engine to analysis the path of virus to analysis the propagation of virus content in each nodes and analysis percentage of affected nodes at each path. FEEDBACK MODEL WITH TIME DELAY Overview of Time Delay In a communications system, propagation delay referstothe time lag between the departure of a signal from the source and the arrival of the signal at the destination.Thiscanrange from a few nanoseconds or microseconds in local area networks (LANs) up to about 0.25 singeostationary-satellite communications systems. Additional propagationdelayscan occur as a result of the time required for packets to make their way through land-based cables and nodes of the Internet. Hold time is also a timing parameter associated with Flip Flops and all other sequential devices. The Hold time is used to further satisfy the minimum pulse width requirement for the first (Master) latch that makes up a flip flop. The input must not change until enough time has passed after the clock tick to guarantee the master latch is fully disabled. More simply, hold time is the amount of time that an input signal (to a sequential device) must be stable (unchanging) after the clock tick in order to guarantee minimum pulse width and thus avoid possible met stability. Propagation delay of a logic gate is defined as the time it takes for the effect of change in input to be visible at the output. In other words, propagation delay is the time required for the input to be propagated to the output. Normally, it is defined as the difference between the times when the transitioning input reaches50%ofitsfinalvalueto the time when the output reaches 50% of the final value showing the effect of input change. Here, 50% is the defined as the logic threshold where output (or, in particular, any signal) is assumed to switch its states. Liberty file contains a lookup table for the each input-to-output path (alsocalledas cell arc) for logic gates as .lib models. The table contains values for different input transition times and output loads corresponding to cell delay. Depending upon the input transition and output load that is present in the design for the logic gate under consideration, physical design tools interpolate between these valuesand calculatethecelldelay. FLOWCHART RELATED WORKS There are several important parametersin ourmodelforthe derivation of the infection rate _ that require careful evaluation for the propagation model to achieve the desired accuracy. For MICA2 motes, the maximum packet transmission rate is around 36 packets/secondwithapacket size of 32 bytes. This results in a packet transmission timeof 0.027 second. The average packet loss rate due to effects such as packet collisions, etc., is assumed to lie between 0.1 and 0.2 which is the average value derived from simulation data. Thus, in our formulation, l ¼ 0:1 and Tpkt ¼ 0:027 second. Simulation results of Deluge [11] have shown that the average number of requests for acquiring a page E½Nreq_ is approximately equalto5.4.Oursimulationworks in two phases. In the first phase, we form the networkwhere each node identifies its set of neighbors and entries are made into a neighbor table. By randomly choosing links to keep or delete, we control the average degree of the
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 2766 network. We perform this by modifying the transmit power of individual nodes so as to change the average number of total links in the network. The entry for each node in the neighborhood table can indicate whether a node is susceptible, infected, or recovered.Weoutlinethesimulation setup and detail to implement the propagation process in each of the three broadcast protocols. The time dynamics of the malware spread is captured with varying degrees of infectivity on the whole network. We have usedJProwler[4], a probabilistic, event-driven wireless network simulator in Java, for our experiments. CONCLUSION With the proliferation of social networks and their ever increasing use, viruses have become much more prevalent. We investigate the propagation effect of search engines, and characterize the positive feedback effect and the propagation wormhole effect. The virtual virus pool and virtual infection paths that are formed by a search engine make propagation take place much more quickly. We show that propagation velocity is quicker, infection density is larger, the epidemic threshold is lower and the basic reproduction number is greater in the presence of a search engine. Finally, we conduct experiments that verify the propagation effect in terms of both infection density and virus propagation velocity. Results show the significant influence of a search engine particularly its ability to accelerate virus propagation in social networks. Broadcast protocols in sensor networks are vulnerable as potential carriers of malwares/viruses that spread over air interfaces. In this paper, we have provided a common mathematical model to analyze the process of malware propagation over different multichip broadcast protocols, although approximately, our model successfullycapturesthe ripple-based propagation behavior of the wave front of a broadcast protocol. Not only is the model capable of assessing the performance of each protocol in the face of a virus outbreak, but it also helps in comparing their vulnerabilities against each other. Its generic and flexible nature allows us to conveniently fit parameters of different broadcast protocols and analyze their susceptibilities. Despite the similarities in operation between some of the protocols discussed, the epidemic model successfully highlights their differences from a propagation standpoint. REFERENCE [1] S. Wen, W. Zhou, J. Zhang, Y. Xiang, W. Zhou, W. Jia, and C. C. Zou, “Modeling and analysis on the propagation dynamics of modern email malware,” IEEE Trans. Dependable Sec. Computer., vol. 11, no.4,pp.361–374,2014. [2]J. Zhang and Z. Jin, “Epidemic spreading on complex networks with community structure,” Applied Mathematics and Computation, vol. 219, no. 6, pp. 2829–2838, 2012. [3] C. Fu, Q. Huang, L. Han, L. Shen, and X. Liu, “Virus propagation power of the dynamic network,” EURASIP J. Wireless Comm. AndNetworking, vol. 2013, p. 210, 2013. [4] L. Lu, R. Perdisci, and W. Lee, “SURF: detecting and measuringsearch poisoning,” in Proceedingsofthe18thACM Conference onComputer and Communications Security,CCS, Chicago, Illinois, USA,October 17-21, 2011, pp. 467 476. [5] H. W. S. Herbert W. Hethcote and P. V. D. Driessche, “Nonlinearoscillations in epidemic models,” Society for Industrial and AppliedMathematics, vol. 40, no. 1, pp. 1 9, 2006. [6] Y. Zhou and X. Jiang, “Dissecting android malware: Characterizationand evolution,” in IEEE Symposium on Security and Privacy,SP, 21-23 May, San Francisco, California, USA, 2012, pp. 95–109. [7] K. Aoki, T. Yagi, M. Iwamura, and M. Itoh, “Controlling malwareHTTP communications in dynamic analysis system using search engine,” in CSS, 2011, pp. 1–6 [8] J. Shang, L. Liu, F. Xie, and C. Wu, “How overlapping community structure affects epidemic spreading incomplex networks,” in IEEE 38th Annual Computer Software and Applications Conference,COMPSAC Workshops, Vasteras, Sweden, July 21-25, 2014, pp. 240– 245. [9] I. Tunc and L. B. Shaw, “Effects of community structure on epidemic spread in an adaptivenetwork,”CoRR, vol. abs/1212.3229, 2012. [10] J. T. Jackson and S. Creese, “Virus propagation in heterogeneousBluetooth networkswith human behaviors,” IEEE Trans. Dependable Sec. Comput., vol. 9, no. 6, pp. 930– 943, 2012.