Submit Search
Upload
IRJET- The Hidden Virus Propagation Search Engine Attack
•
0 likes
•
18 views
IRJET Journal
Follow
https://www.irjet.net/archives/V5/i3/IRJET-V5I3636.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 3
Download now
Download to read offline
Recommended
Identifying Malicious Data in Social Media
Identifying Malicious Data in Social Media
IRJET Journal
Limiting self propagating malware based
Limiting self propagating malware based
IJNSA Journal
Limiting Self-Propagating Malware Based on Connection Failure Behavior
Limiting Self-Propagating Malware Based on Connection Failure Behavior
csandit
A survey on evil twin detection methods for wireless local area network
A survey on evil twin detection methods for wireless local area network
IAEME Publication
C0363012014
C0363012014
inventionjournals
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET Journal
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
IRJET Journal
Novel Method to Overcome Vulnerability in Wi-Fi Network
Novel Method to Overcome Vulnerability in Wi-Fi Network
IRJET Journal
Recommended
Identifying Malicious Data in Social Media
Identifying Malicious Data in Social Media
IRJET Journal
Limiting self propagating malware based
Limiting self propagating malware based
IJNSA Journal
Limiting Self-Propagating Malware Based on Connection Failure Behavior
Limiting Self-Propagating Malware Based on Connection Failure Behavior
csandit
A survey on evil twin detection methods for wireless local area network
A survey on evil twin detection methods for wireless local area network
IAEME Publication
C0363012014
C0363012014
inventionjournals
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET Journal
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
IRJET Journal
Novel Method to Overcome Vulnerability in Wi-Fi Network
Novel Method to Overcome Vulnerability in Wi-Fi Network
IRJET Journal
IRJET- Secure Data Transmission from Malicious Attacks: A Review
IRJET- Secure Data Transmission from Malicious Attacks: A Review
IRJET Journal
Wormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systems
Pvrtechnologies Nellore
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
ijsptm
Fault Link Detection in WSN using Link Scanner Approach
Fault Link Detection in WSN using Link Scanner Approach
IRJET Journal
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
IRJET Journal
Pre-filters in-transit malware packets detection in the network
Pre-filters in-transit malware packets detection in the network
TELKOMNIKA JOURNAL
Wormhole attack detection algorithms
Wormhole attack detection algorithms
kitechsolutions
Machine Learning Techniques Used for the Detection and Analysis of Modern Typ...
Machine Learning Techniques Used for the Detection and Analysis of Modern Typ...
IRJET Journal
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
ijceronline
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
IDES Editor
Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...
Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...
IRJET Journal
Environment based secure transfer of data in wireless sensor networks
Environment based secure transfer of data in wireless sensor networks
ijsptm
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
IJCNCJournal
A43030104
A43030104
IJERA Editor
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
ijp2p
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
IEEEGLOBALSOFTTECHNOLOGIES
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
IDES Editor
1426742816
1426742816
Sagar Pande
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
IRJET Journal
Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...
eSAT Publishing House
A05510105
A05510105
IOSR-JEN
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...
IJNSA Journal
More Related Content
What's hot
IRJET- Secure Data Transmission from Malicious Attacks: A Review
IRJET- Secure Data Transmission from Malicious Attacks: A Review
IRJET Journal
Wormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systems
Pvrtechnologies Nellore
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
ijsptm
Fault Link Detection in WSN using Link Scanner Approach
Fault Link Detection in WSN using Link Scanner Approach
IRJET Journal
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
IRJET Journal
Pre-filters in-transit malware packets detection in the network
Pre-filters in-transit malware packets detection in the network
TELKOMNIKA JOURNAL
Wormhole attack detection algorithms
Wormhole attack detection algorithms
kitechsolutions
Machine Learning Techniques Used for the Detection and Analysis of Modern Typ...
Machine Learning Techniques Used for the Detection and Analysis of Modern Typ...
IRJET Journal
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
ijceronline
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
IDES Editor
Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...
Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...
IRJET Journal
Environment based secure transfer of data in wireless sensor networks
Environment based secure transfer of data in wireless sensor networks
ijsptm
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
IJCNCJournal
A43030104
A43030104
IJERA Editor
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
ijp2p
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
IEEEGLOBALSOFTTECHNOLOGIES
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
IDES Editor
What's hot
(17)
IRJET- Secure Data Transmission from Malicious Attacks: A Review
IRJET- Secure Data Transmission from Malicious Attacks: A Review
Wormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systems
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
Fault Link Detection in WSN using Link Scanner Approach
Fault Link Detection in WSN using Link Scanner Approach
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
Pre-filters in-transit malware packets detection in the network
Pre-filters in-transit malware packets detection in the network
Wormhole attack detection algorithms
Wormhole attack detection algorithms
Machine Learning Techniques Used for the Detection and Analysis of Modern Typ...
Machine Learning Techniques Used for the Detection and Analysis of Modern Typ...
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...
Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...
Environment based secure transfer of data in wireless sensor networks
Environment based secure transfer of data in wireless sensor networks
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
A43030104
A43030104
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Similar to IRJET- The Hidden Virus Propagation Search Engine Attack
1426742816
1426742816
Sagar Pande
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
IRJET Journal
Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...
eSAT Publishing House
A05510105
A05510105
IOSR-JEN
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...
IJNSA Journal
Prevention against new cell counting attack against tor network
Prevention against new cell counting attack against tor network
eSAT Journals
Prevention against new cell counting attack against tor network
Prevention against new cell counting attack against tor network
eSAT Publishing House
Indexing Building Evaluation Criteria
Indexing Building Evaluation Criteria
IJERA Editor
Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...
Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...
IRJET Journal
Survey on Security Aspects Related to DOIP
Survey on Security Aspects Related to DOIP
IRJET Journal
A secure routing process to simultaneously defend against false report and wo...
A secure routing process to simultaneously defend against false report and wo...
ieijjournal
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET Journal
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET Journal
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...
IJNSA Journal
A Survey on Secured Routing In AD HOC Networks for Various Attacks
A Survey on Secured Routing In AD HOC Networks for Various Attacks
IRJET Journal
Self Adaptive Automatch Protocol for Batch Identification Mechanism in Wirele...
Self Adaptive Automatch Protocol for Batch Identification Mechanism in Wirele...
IRJET Journal
Ii3415521555
Ii3415521555
IJERA Editor
7 ijcse-01229
7 ijcse-01229
Shivlal Mewada
IRJET- Hashxplorer-A Distributed System for Hash Matching
IRJET- Hashxplorer-A Distributed System for Hash Matching
IRJET Journal
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
CSCJournals
Similar to IRJET- The Hidden Virus Propagation Search Engine Attack
(20)
1426742816
1426742816
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...
A05510105
A05510105
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...
Prevention against new cell counting attack against tor network
Prevention against new cell counting attack against tor network
Prevention against new cell counting attack against tor network
Prevention against new cell counting attack against tor network
Indexing Building Evaluation Criteria
Indexing Building Evaluation Criteria
Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...
Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...
Survey on Security Aspects Related to DOIP
Survey on Security Aspects Related to DOIP
A secure routing process to simultaneously defend against false report and wo...
A secure routing process to simultaneously defend against false report and wo...
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...
A Survey on Secured Routing In AD HOC Networks for Various Attacks
A Survey on Secured Routing In AD HOC Networks for Various Attacks
Self Adaptive Automatch Protocol for Batch Identification Mechanism in Wirele...
Self Adaptive Automatch Protocol for Batch Identification Mechanism in Wirele...
Ii3415521555
Ii3415521555
7 ijcse-01229
7 ijcse-01229
IRJET- Hashxplorer-A Distributed System for Hash Matching
IRJET- Hashxplorer-A Distributed System for Hash Matching
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Mark Billinghurst
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
vipinkmenon1
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
soniya singh
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Dr.Costas Sachpazis
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
srsj9000
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
britheesh05
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
jennyeacort
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
rehmti665
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Dr.Costas Sachpazis
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ranjana rawat
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
eptoze12
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Recently uploaded
(20)
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
IRJET- The Hidden Virus Propagation Search Engine Attack
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 2764 THE HIDDEN VIRUS PROPAGATION SEARCH ENGINE ATTACK Aswini.V1, Meena.S2, Vinmathi .M.S3 1,2 Student Member, Dept. of CSE, Panimalar Engineering college, Tamil Nadu, India 3Associate Professor, Dept. of CSE, Panimalar Engineering college, Tamil Nadu, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Many real-world networks exhibit overlapping community structure in which vertices may belong to more than one community. We classify vertices intooverlappingand non-overlapping ones, and investigate indetailhowtheyaffect epidemic spreading respectively. One of the important dynamics on complex networks is epidemic spreading. An important issue is, for a given community structureofcomplex network, how the infection propagatesandwhetherthereexist effective control strategies for preventing or suppressing the spread of infection. When an epidemic spreadsinapopulation, individuals may adaptively change the structureoftheirsocial contact network to reduce risk of infection. Here we study the spread of an epidemic on an adaptive network with community structure. In a static network, weakly connected heterogeneous communities can have significantly different infection levels. In contrast, adaptation promotes similar infection levels and alters the network structure so that communities have more similar average degrees. Key Words: Epidemic spreading, infection propagation, infection level, average degree. 1. INTRODUCTION The current research on network virus propagation can be divided into two categories: some researchers model the propagation of virus to find the threshold of a large-scale breakout, while others attempt to study the mechanism of a restraining virus. In the study of virus defense in the mobile network, it is found that virus propagation in a mobile network is difficult to restrain because the topology of the network is changing frequently due to the mobility of devices. There are two kinds of strategies restraining the virus in a mobile network: immunization strategy and local strategy. In most cases, immunization strategies are implemented based on centralized distribution and static network. Within a group, each member is directlyconnected to most other members, but connections among different groups are relatively rare. In some degree, structure determines the characteristics and function of networks. To explain the mechanism of social networks, several models have been presented, which include the mutual friendship approach, dense links in community and sparse links between communities. Computer worms, which have been rampant in the Internet for more than two decades, are nothing new to us. Bluetooth wormssignificantlydifferfrom Internet worms in three ways. First, thelimitedtransmission range of a Bluetooth device leads to a proximity-based infection mechanism: a Bluetooth-enabled devicecontrolled by the worm can only infect neighborswithinitsradiorange. This differs from Internet worms that often scan the entire IP address space for susceptible victims. Second, the bandwidth available to Bluetooth devices is usually much narrower than those of Internet links. For instance, the maximum transmission rate of a device operating on the class 2 Bluetooth radio is 1 Mbps. The input parameters fed to this model include some key statistical metrics that describe the underlying mobility patterns, such as average node degree, average node meeting rate, and the link duration distribution. The input parameters of the model also include control parameters used by the Bluetooth worms, such as how much time the Bluetooth worm spends at most on discovering new victimsand how many victimsit expects to discover within a single infection cycle, and how long the Bluetooth worm remains dormant before it is activated again for new infection attempts. Problem Definition In the traditional view, viruses cannot spread among unconnected nodes or communities. But in fact, virus propagation can occur among globalusersorcommunitiesin social networks through search engines, regardless of the connectivity of nodes and communities. We call this phenomenon the propagation wormhole effect. The propagation wormhole effect is the specific manifestationof the hidden power of search engines on virus propagation. A primary challenge for analysing the viruspropagation effect of search engines lies in figuring out the processes by which a search engine increases the number of infection sources and the infection routes. Emotion categories, namely, awe, amusement, contentment excitement, anger, disgust, sadness, fear and boredom. Then, we investigate whether user demographics such as gender, marital status and occupation are related to the emotional tagsofsocialimages. We uncover several patterns, and a partially labelled factor graph model named the demographics factor graph model (D-FGM) is proposed to leverage user demographics in the modelling as different factors.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 2765 Architecture Diagram MODULES: SEARCH ENGINE MODULE In this module the user login to the application and use search engine to search any content of dataintheapplication to get the required data with respective to the keywords entered in the search engine. UNOFFICIAL URL BLINK MODULE The user click the unofficial links and get access the data along with virus which get affected along with the retrieval of data then application sends the notification to the admin for the virus detection. VIRUS PROPAGATION ANALYSATION MODULE Admin analysis the gets details of malicious virus and uses search engine to analysis the path of virus to analysis the propagation of virus content in each nodes and analysis percentage of affected nodes at each path. FEEDBACK MODEL WITH TIME DELAY Overview of Time Delay In a communications system, propagation delay referstothe time lag between the departure of a signal from the source and the arrival of the signal at the destination.Thiscanrange from a few nanoseconds or microseconds in local area networks (LANs) up to about 0.25 singeostationary-satellite communications systems. Additional propagationdelayscan occur as a result of the time required for packets to make their way through land-based cables and nodes of the Internet. Hold time is also a timing parameter associated with Flip Flops and all other sequential devices. The Hold time is used to further satisfy the minimum pulse width requirement for the first (Master) latch that makes up a flip flop. The input must not change until enough time has passed after the clock tick to guarantee the master latch is fully disabled. More simply, hold time is the amount of time that an input signal (to a sequential device) must be stable (unchanging) after the clock tick in order to guarantee minimum pulse width and thus avoid possible met stability. Propagation delay of a logic gate is defined as the time it takes for the effect of change in input to be visible at the output. In other words, propagation delay is the time required for the input to be propagated to the output. Normally, it is defined as the difference between the times when the transitioning input reaches50%ofitsfinalvalueto the time when the output reaches 50% of the final value showing the effect of input change. Here, 50% is the defined as the logic threshold where output (or, in particular, any signal) is assumed to switch its states. Liberty file contains a lookup table for the each input-to-output path (alsocalledas cell arc) for logic gates as .lib models. The table contains values for different input transition times and output loads corresponding to cell delay. Depending upon the input transition and output load that is present in the design for the logic gate under consideration, physical design tools interpolate between these valuesand calculatethecelldelay. FLOWCHART RELATED WORKS There are several important parametersin ourmodelforthe derivation of the infection rate _ that require careful evaluation for the propagation model to achieve the desired accuracy. For MICA2 motes, the maximum packet transmission rate is around 36 packets/secondwithapacket size of 32 bytes. This results in a packet transmission timeof 0.027 second. The average packet loss rate due to effects such as packet collisions, etc., is assumed to lie between 0.1 and 0.2 which is the average value derived from simulation data. Thus, in our formulation, l ¼ 0:1 and Tpkt ¼ 0:027 second. Simulation results of Deluge [11] have shown that the average number of requests for acquiring a page E½Nreq_ is approximately equalto5.4.Oursimulationworks in two phases. In the first phase, we form the networkwhere each node identifies its set of neighbors and entries are made into a neighbor table. By randomly choosing links to keep or delete, we control the average degree of the
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 2766 network. We perform this by modifying the transmit power of individual nodes so as to change the average number of total links in the network. The entry for each node in the neighborhood table can indicate whether a node is susceptible, infected, or recovered.Weoutlinethesimulation setup and detail to implement the propagation process in each of the three broadcast protocols. The time dynamics of the malware spread is captured with varying degrees of infectivity on the whole network. We have usedJProwler[4], a probabilistic, event-driven wireless network simulator in Java, for our experiments. CONCLUSION With the proliferation of social networks and their ever increasing use, viruses have become much more prevalent. We investigate the propagation effect of search engines, and characterize the positive feedback effect and the propagation wormhole effect. The virtual virus pool and virtual infection paths that are formed by a search engine make propagation take place much more quickly. We show that propagation velocity is quicker, infection density is larger, the epidemic threshold is lower and the basic reproduction number is greater in the presence of a search engine. Finally, we conduct experiments that verify the propagation effect in terms of both infection density and virus propagation velocity. Results show the significant influence of a search engine particularly its ability to accelerate virus propagation in social networks. Broadcast protocols in sensor networks are vulnerable as potential carriers of malwares/viruses that spread over air interfaces. In this paper, we have provided a common mathematical model to analyze the process of malware propagation over different multichip broadcast protocols, although approximately, our model successfullycapturesthe ripple-based propagation behavior of the wave front of a broadcast protocol. Not only is the model capable of assessing the performance of each protocol in the face of a virus outbreak, but it also helps in comparing their vulnerabilities against each other. Its generic and flexible nature allows us to conveniently fit parameters of different broadcast protocols and analyze their susceptibilities. Despite the similarities in operation between some of the protocols discussed, the epidemic model successfully highlights their differences from a propagation standpoint. REFERENCE [1] S. Wen, W. Zhou, J. Zhang, Y. Xiang, W. Zhou, W. Jia, and C. C. Zou, “Modeling and analysis on the propagation dynamics of modern email malware,” IEEE Trans. Dependable Sec. Computer., vol. 11, no.4,pp.361–374,2014. [2]J. Zhang and Z. Jin, “Epidemic spreading on complex networks with community structure,” Applied Mathematics and Computation, vol. 219, no. 6, pp. 2829–2838, 2012. [3] C. Fu, Q. Huang, L. Han, L. Shen, and X. Liu, “Virus propagation power of the dynamic network,” EURASIP J. Wireless Comm. AndNetworking, vol. 2013, p. 210, 2013. [4] L. Lu, R. Perdisci, and W. Lee, “SURF: detecting and measuringsearch poisoning,” in Proceedingsofthe18thACM Conference onComputer and Communications Security,CCS, Chicago, Illinois, USA,October 17-21, 2011, pp. 467 476. [5] H. W. S. Herbert W. Hethcote and P. V. D. Driessche, “Nonlinearoscillations in epidemic models,” Society for Industrial and AppliedMathematics, vol. 40, no. 1, pp. 1 9, 2006. [6] Y. Zhou and X. Jiang, “Dissecting android malware: Characterizationand evolution,” in IEEE Symposium on Security and Privacy,SP, 21-23 May, San Francisco, California, USA, 2012, pp. 95–109. [7] K. Aoki, T. Yagi, M. Iwamura, and M. Itoh, “Controlling malwareHTTP communications in dynamic analysis system using search engine,” in CSS, 2011, pp. 1–6 [8] J. Shang, L. Liu, F. Xie, and C. Wu, “How overlapping community structure affects epidemic spreading incomplex networks,” in IEEE 38th Annual Computer Software and Applications Conference,COMPSAC Workshops, Vasteras, Sweden, July 21-25, 2014, pp. 240– 245. [9] I. Tunc and L. B. Shaw, “Effects of community structure on epidemic spread in an adaptivenetwork,”CoRR, vol. abs/1212.3229, 2012. [10] J. T. Jackson and S. Creese, “Virus propagation in heterogeneousBluetooth networkswith human behaviors,” IEEE Trans. Dependable Sec. Comput., vol. 9, no. 6, pp. 930– 943, 2012.
Download now