SlideShare a Scribd company logo
International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 6, Issue 9 (April 2013), PP. 48-52
48
Robust Encryption and Decryption (RED) Component
and Standard Encrypt Syntax (SES) For Web Services
Security Architecture
Abhilash R1
, Saravanan E2
,Kalpana G3
1
M.Tech,Information Security and Cyber Forensics, Dr.M.G.R. Educational and Research Institute University
2
Asst.Professor, Dr.M.G.R. Educational and Research Institute University
3
Asst.Professor, Dr.M.G.R. Educational and Research Institute University
Abstract:- With changes in technological landscape the threats and vulnerabilities in network are
rising at an alarming rate. There are many complexities specific to, and inherent in Web services that
further complicate their security. Numerous threats can compromise the confidentiality, integrity, or
availability of a Web service or the back-end systems that a Web service might expose. This paper
discusses re-modeling web services security architecture from security attacks such as network security
attacks, E-Commerce attacks and man in the middle attacks. A detailed conceptual framework is
proposed, based on how safely to send valuable packets to the destination without any security attacks.
This framework is based on providing a Robust Encryption and Decryption (RED) technique for web
browser and the web server and Standard Encrypt Syntax (SES) to web application.
Keywords:- Web Security, Threats and Vulnerabilities in web, Cryptography, Web Security
Architecture
I. INTRODUCTION
Today, there is an ever-growing dependency on computer networks for business transactions. With the
free flow of information and the availability of vast resources, users of enterprise networks have to understand
all the possible threats. These threats[3,9] take many forms; but all result in loss of privacy to some degree and
possibility of malicious destruction of information or resources, that can lead to large monetary losses.
Though many countermeasures are in place taken to provide secure internet, there are still some holes in the
network which lead to severe security attacks[7]. This paper discusses the holes in the network and provides a
detailed conceptual framework to avoid these threats and vulnerabilities.
II. SECURITY THREATS AND VULNERABILITIES IN WEB SERVICES
When we surf the Web, or send E-Mail, the communications between our computer and the server
takes place via the data packet. It is the data packet that contains the information and the request for information
that is sent from our computer to other computers over the Internet. The communication protocol which is used
to govern the flow of data packets is called Transmission Control Protocol/Internet protocol or TCP/IP for
short.
A. Eavesdropping
Eavesdropping, a network packet capturing application that collates and displays all packets in a user
understandable format that passes in communication channel. Intruder understands and gain information about
the packet.
A sample skype Trojan source snippet:
If (fPFWCircumventionStatus [mCircumventionType] (mGetBuffer, mProxyCon
REQUEST_TYPE_SYSTEMUP) != 0)
Sleep(NOCONNECTIVITYSLEEP);
else{
remoteStatusChecks(mGetBuffer);
mConnectivity=1;
}}
B. TCP Hijacking
Weakness in creating TCP connections will open way for new attacks such as TCP/IP hijacking.
TCP/IP hijacking technique[4] uses spoofed packets to take over a connection between a victim and a host
Robust Encryption and Decryption (RED) Component and Standard Encrypt…
49
machine. It is successfully done by predicting intial sequence number that gets exchanged between victim and
host.
C. Session hijacking
Session tokens are passed between client and server when server authenticates a client during login.
Attackers hijack these session tokens and use it to acquire unauthorized access to web server.
<?php
If(isset($_REQUEST[“cmd”]))
{
Sf=fopen(“stolen.txt”,”w+”);
fwrite(Sf,$_REQUEST[“cmd”].”<br>”);
fclose(sf);
}
D. Network sniffing
It is a technique of capturing network packets that are transferred in communication links. It captures
all network packets and provides clear information about packets to intruder which results in attacks like
eavesdropping, man-in-the-middle attack.
Sample code for incoming traffic on all ports
WSAIoct1(thisSocket, &inn, sizeof(inn), &out, sizeof(out))
III. EXISTING SYSTEM
A. SSL/TLS Certificate:
SSL[8] is an encryption technology that provides secure communication between client and server by
encrypting packet information and link. It involves
 SSL Server Authentication
 SSL Client Authentication
 An Encrypted SSL Connection
It protects data passed between communication links from network attacks such as sniffing, spoofing,
data tampering. These certificates are issued by third party companies.
B. Disadvantages of SSL
1. SSL reduces site speed: SSL can reduce the time it takes for data to travel between the user and website
by two to ten times. Moreover it increases network traffic by 300 percent.
2. SSL costs money: The cost of SSL is more which looks very expensive for single one who maintains
site.
3. SSL isn’t secure: As day-by day many attacking techniques evolves, SSL fails to provide security.
4. SSL regular renewal: SSL certificates have to be renewed regularly and it fails if renewal is not done
on time.
5. Complex installation of SSL: Installing process of SSL is very complex.
IV. COUNTERMEASURES: RE-MODELING WEB SERVICES SECURITY
ARCHITECTURE
The key to effective Web services security[11] is to know the threats as described previously,
understand the technical solutions for mitigating these threats, and then establish and follow a defined
engineering process that takes security into consideration from the beginning and throughout the Web service
life cycle. This process can be established in the following two steps:
1. Deployment of Robust Encryption and Decryption Entity [RED] for Browser and Web Server
2. Deployment of Standard Encrypt Syntax
A. Robust Encryption and Decryption Entity [RED] for Browser and Web Server
A detailed conceptual framework is proposed on how safely to send valuable packets to destination
without any security attacks related to web services. This proposed framework is based on providing a common
encryption and decryption component that should be deployed in both web browser and the web server.
1. RED Component: A set of common standard encryption algorithm such as RSA, DES could be
grouped together as a component and be deployed in both web server and web browser. This could be done
by adding
Robust Encryption and Decryption (RED) Component and Standard Encrypt…
50
 Add-on service
 Updating the browser/server
Every Algorithm has its own unique id in RED.
For eg: RSA id=3341
Standard Encrypt Syntax in the code calls a particular algorithm from RED to encrypt or decrypt a page.
2. Deployment of RED In Browser: Communication between browser [10] and RED is given below.
Fig 1.2: Communication between Browser and RED
3. Deployment of RED in Web Server: Communication between Server and RED, before and after a web page
is uploaded in to server.
Fig 1.1: Communication between User, Server and RED
B. Deployment of SES
Standard Encrypt Syntax (SES) will be a common code embedded in any programming language to
communicate with RED in browser and server.
1) The syntax for accessing RED:
<SES id=”Encryption Algorithm ID” name=”User defined Encryption name” key=”key_name”> </SES>
For every request been processed, RED encrypts or decrypts from the algorithm and key referred in SES
tag.
2) Algorithm with no key exchange:
<SES id=”Encryption Algorithm ID” name=”User defined Encryption name” key=”no-key”> </SES>
3) Algorithm with single key exchange:
<SES id=”Encryption Algorithm ID” name=”User defined Encryption name” key=”key_name”> </SES>
4) Algorithm with multiple key exchanges:
Cryptographic algorithm with a multiple key[2] could be represented as,
<SES id=”Encryption Algorithm ID” name=”User defined Encryption name” key=”key_name1,
key_name2,key_name3….”></SES>
5) Public Key Algorithm:
Public key Cryptographic algorithm[1] with private key and public key
<SES id=”Encryption Algorithm ID” name=”User defined Encryption name” publickey= ”key_name”
private-key=”key_name”></SES>
Robust Encryption and Decryption (RED) Component and Standard Encrypt…
51
C. Working of RED
The web developer after designing a webpage can use an encryption algorithm from RED which could be added
as a tag in the webpage. While hosting the webpage to the server, the developer is intimated for choose of any
cryptographic algorithm. Therefore, before a data is been send to communication channel, it encrypts with
above mentioned algorithm and send.
Fig 1.1: Robust Encryption and Decryption Component for Web Browser and Web Server
Similarly, when server response to a user, data is encrypted. Browser decrypts the content of the page
by same cryptographic algorithm which is mentioned in the SES tag.
D. From Developer’s Perspective:
There are certain options could be implemented from developer’s perspective:
1) Determine a suitable encryption algorithm from RED
Developer can choose any algorithm [6] of his choice suitable for his webpage from RED. Developer
need not be a cryptographer. Implementing a cryptographic algorithm is done by adding a small SES tag in to
his web page.
2) Encrypt Priority fields
Encryption and Decryption technique can possibly place a high load on the server/client proportionate
to the size of the webpage. Considering a webpage with content larger than 2mb, there is a possibility of time
delay in loading the content of the webpage.
In order to reduce the time in loading and to provide more efficiency, the developer can encrypt a part of a
webpage which he is going to give more priority. It may be a form field or a table of content. Encryption is done
on priority basis. For instance consider an E-Commerce website. The Developer gives more attention on form
fields and transaction links. Therefore he can encrypt that part of priority areas.
<body>
<div>…….</div>
<SES id=”2233” name=”Caesar” key=”no-key”>
<div> <form>…..</form></div>
</SES>
V. ADVANTAGES
1. Deploying RED component is done by simple updating or through add-ons.
2. Accessing RED is done by simple SES tag that is supported by RED.
3. Another advantage over sniffers is after the user types his username and password and clicks send, the
username and passwords are encrypted and sent via packets. If an intruder tries to capture and view the packet
Robust Encryption and Decryption (RED) Component and Standard Encrypt…
52
information, there will be no possibility of identifying the actual information. This ensures more security on
networks.
4. Instead going for paid secure services, this framework can bring security to entire network.
VI. CONCLUSION
Due to enormous threats and vulnerabilities, there is a desperate need for some standards that should
prevent and deter the attackers. Implementing this Robust Encryption and Decryption component and Standard
Encrypt Syntax will add a higher level of security to the communication channel.
REFERENCES
[1] V. Shoup, “A proposal for an ISO standard for public key encryption”, http://eprint.iacr.org/2001/112,
2001.
[2] S. S. Al-Riyami and K. G. Paterson. “Authenticated three party key agreement protocols from
pairings.” Cryptology e-Print Archive, http://eprint.iacr.org/2002/035/
[3] R. C. Summers, “Secure Computing” – Threats and Safeguards, McGraw-Hill, 1997
[4] CERT, “TCP SYN Flooding and IP Spoofing Attacks”, Carnegie Mellon University, Sept. 1996
[5] Eastlake and P. Jones, US Secure Hash Algorithm 1 (SHA1), IETF RFC 3174, Sept. 2001.
[6] Choosing an encryption algorithm: technet.microsoft.com/en-us/library/ms345262.aspx
[7] Common types of network attacks: http://technet.microsoft.com/en-us/library/cc959354.aspx
[8] Understanding of digital certificates and SSL: http://www.entrust.net/ssl-
resources/pdf/understanding_ssl.pdf
[9] Web security threats: http://www.gfi.com/whitepapers/GFI-Web_Based_Threats_v2_Whitepaper.pdf
[10] Browser security and privacy: http://www.securingthehuman.org/newsletters/ouch/issues/OUCH-
201111_en.pdf
[11] Bhandari R, Suman U, “Generalized Framework for Secure Web Service Composition”

More Related Content

What's hot

Web Security
Web SecurityWeb Security
Web Security
Dr.Florence Dayana
 
Web Security
Web SecurityWeb Security
Web Security
Dipika Bambhaniya
 
Network Security
Network  SecurityNetwork  Security
Network Security
VIKAS SINGH BHADOURIA
 
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
IJNSA Journal
 
Cit877[1]
Cit877[1]Cit877[1]
Cit877[1]
poonamjindal6
 
14 577
14 57714 577
Mattias eriksson
Mattias erikssonMattias eriksson
Mattias erikssonHai Nguyen
 
CEH v9 cheat sheet notes Certified Ethical Hacker
CEH v9 cheat sheet notes  Certified Ethical HackerCEH v9 cheat sheet notes  Certified Ethical Hacker
CEH v9 cheat sheet notes Certified Ethical Hacker
David Sweigert
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
cscpconf
 
Email Security Presentation
Email Security PresentationEmail Security Presentation
Email Security PresentationYosef Gamble
 
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
IJNSA Journal
 
E-mail Security in Network Security NS5
E-mail Security in Network Security NS5E-mail Security in Network Security NS5
E-mail Security in Network Security NS5koolkampus
 
5 Ways To Fight A DDoS Attack
5 Ways To Fight A DDoS Attack5 Ways To Fight A DDoS Attack
5 Ways To Fight A DDoS Attack
RedZone Technologies
 
Certified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheetCertified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheet
David Sweigert
 
Implementation of public key cryptography in kerberos with prevention 2
Implementation of public key cryptography in kerberos with prevention 2Implementation of public key cryptography in kerberos with prevention 2
Implementation of public key cryptography in kerberos with prevention 2IAEME Publication
 
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LANAvoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
Editor IJCATR
 
Ijcnc050205
Ijcnc050205Ijcnc050205
Ijcnc050205
IJCNCJournal
 

What's hot (19)

Web Security
Web SecurityWeb Security
Web Security
 
Web Security
Web SecurityWeb Security
Web Security
 
Network Security
Network  SecurityNetwork  Security
Network Security
 
Net Sec
Net SecNet Sec
Net Sec
 
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
 
Security
SecuritySecurity
Security
 
Cit877[1]
Cit877[1]Cit877[1]
Cit877[1]
 
14 577
14 57714 577
14 577
 
Mattias eriksson
Mattias erikssonMattias eriksson
Mattias eriksson
 
CEH v9 cheat sheet notes Certified Ethical Hacker
CEH v9 cheat sheet notes  Certified Ethical HackerCEH v9 cheat sheet notes  Certified Ethical Hacker
CEH v9 cheat sheet notes Certified Ethical Hacker
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
 
Email Security Presentation
Email Security PresentationEmail Security Presentation
Email Security Presentation
 
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
 
E-mail Security in Network Security NS5
E-mail Security in Network Security NS5E-mail Security in Network Security NS5
E-mail Security in Network Security NS5
 
5 Ways To Fight A DDoS Attack
5 Ways To Fight A DDoS Attack5 Ways To Fight A DDoS Attack
5 Ways To Fight A DDoS Attack
 
Certified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheetCertified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheet
 
Implementation of public key cryptography in kerberos with prevention 2
Implementation of public key cryptography in kerberos with prevention 2Implementation of public key cryptography in kerberos with prevention 2
Implementation of public key cryptography in kerberos with prevention 2
 
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LANAvoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
 
Ijcnc050205
Ijcnc050205Ijcnc050205
Ijcnc050205
 

Viewers also liked

Catalogo 2011 2012 colori e stoffe
Catalogo 2011 2012 colori e stoffeCatalogo 2011 2012 colori e stoffe
Catalogo 2011 2012 colori e stoffeicse
 
Biblioteca municipală.anul bibliologic
Biblioteca  municipală.anul bibliologicBiblioteca  municipală.anul bibliologic
Biblioteca municipală.anul bibliologicEugeniuCoseriu
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Jussi Mälkiä 4.4.2013: Biotaloudella tulevaisuuteen
Jussi Mälkiä 4.4.2013: Biotaloudella tulevaisuuteenJussi Mälkiä 4.4.2013: Biotaloudella tulevaisuuteen
Jussi Mälkiä 4.4.2013: Biotaloudella tulevaisuuteenSitra / Ekologinen kestävyys
 
Chris Teegan, Operations Director
Chris Teegan, Operations DirectorChris Teegan, Operations Director
Chris Teegan, Operations Director
Sinead Donnellan Human Resources CIPD
 
Mussinano paola
Mussinano paolaMussinano paola
Mussinano paolamux171
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Efficient Migration of Verilog Testbenches to 'UVM' Keeping the Functionality...
Efficient Migration of Verilog Testbenches to 'UVM' Keeping the Functionality...Efficient Migration of Verilog Testbenches to 'UVM' Keeping the Functionality...
Efficient Migration of Verilog Testbenches to 'UVM' Keeping the Functionality...DVClub
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
庭劇団ペニノはこぶね新作『大きなトランクの中の箱』公開記念スライド
庭劇団ペニノはこぶね新作『大きなトランクの中の箱』公開記念スライド庭劇団ペニノはこぶね新作『大きなトランクの中の箱』公開記念スライド
庭劇団ペニノはこぶね新作『大きなトランクの中の箱』公開記念スライド
niwagekidan
 
Hiệp khánh hành - 76
Hiệp khánh hành - 76Hiệp khánh hành - 76
Hiệp khánh hành - 76Thao Le
 
DLI Travel Pilgrimage Tours
DLI Travel Pilgrimage Tours DLI Travel Pilgrimage Tours
DLI Travel Pilgrimage Tours
DLI TRAVEL
 
Hiệp khánh hành - 70
Hiệp khánh hành - 70Hiệp khánh hành - 70
Hiệp khánh hành - 70Thao Le
 
Hiệp khánh hành - 78
Hiệp khánh hành - 78Hiệp khánh hành - 78
Hiệp khánh hành - 78Thao Le
 

Viewers also liked (20)

Catalogo 2011 2012 colori e stoffe
Catalogo 2011 2012 colori e stoffeCatalogo 2011 2012 colori e stoffe
Catalogo 2011 2012 colori e stoffe
 
Biblioteca municipală.anul bibliologic
Biblioteca  municipală.anul bibliologicBiblioteca  municipală.anul bibliologic
Biblioteca municipală.anul bibliologic
 
Pedro Brey
Pedro Brey Pedro Brey
Pedro Brey
 
Yuehui Tang
Yuehui TangYuehui Tang
Yuehui Tang
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Jussi Mälkiä 4.4.2013: Biotaloudella tulevaisuuteen
Jussi Mälkiä 4.4.2013: Biotaloudella tulevaisuuteenJussi Mälkiä 4.4.2013: Biotaloudella tulevaisuuteen
Jussi Mälkiä 4.4.2013: Biotaloudella tulevaisuuteen
 
Chris Teegan, Operations Director
Chris Teegan, Operations DirectorChris Teegan, Operations Director
Chris Teegan, Operations Director
 
Mussinano paola
Mussinano paolaMussinano paola
Mussinano paola
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Efficient Migration of Verilog Testbenches to 'UVM' Keeping the Functionality...
Efficient Migration of Verilog Testbenches to 'UVM' Keeping the Functionality...Efficient Migration of Verilog Testbenches to 'UVM' Keeping the Functionality...
Efficient Migration of Verilog Testbenches to 'UVM' Keeping the Functionality...
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
庭劇団ペニノはこぶね新作『大きなトランクの中の箱』公開記念スライド
庭劇団ペニノはこぶね新作『大きなトランクの中の箱』公開記念スライド庭劇団ペニノはこぶね新作『大きなトランクの中の箱』公開記念スライド
庭劇団ペニノはこぶね新作『大きなトランクの中の箱』公開記念スライド
 
Hiệp khánh hành - 76
Hiệp khánh hành - 76Hiệp khánh hành - 76
Hiệp khánh hành - 76
 
N5
N5N5
N5
 
DLI Travel Pilgrimage Tours
DLI Travel Pilgrimage Tours DLI Travel Pilgrimage Tours
DLI Travel Pilgrimage Tours
 
N4
N4N4
N4
 
Malalasekera
MalalasekeraMalalasekera
Malalasekera
 
Hiệp khánh hành - 70
Hiệp khánh hành - 70Hiệp khánh hành - 70
Hiệp khánh hành - 70
 
Hiệp khánh hành - 78
Hiệp khánh hành - 78Hiệp khánh hành - 78
Hiệp khánh hành - 78
 

Similar to Welcome to International Journal of Engineering Research and Development (IJERD)

Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
Shakas Technologies
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
Shakas Technologies
 
RAZORPOINT SECURITY GLOSSARY
RAZORPOINT SECURITY GLOSSARYRAZORPOINT SECURITY GLOSSARY
RAZORPOINT SECURITY GLOSSARY
Razorpoint Security
 
Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)
Jayanth Dwijesh H P
 
Communications Technologies
Communications TechnologiesCommunications Technologies
Communications Technologies
Sarah Jimenez
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
IRJET Journal
 
Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.
Jayanth Dwijesh H P
 
Security Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iSecurity Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11i
inventionjournals
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET Journal
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
girmawodajo
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layerAhmed Elnaggar
 
Network Security_Module_2.pdf
Network Security_Module_2.pdfNetwork Security_Module_2.pdf
Network Security_Module_2.pdf
Dr. Shivashankar
 
IRJET- A Survey on DDOS Attack in Manet
IRJET-  	  A Survey on DDOS Attack in ManetIRJET-  	  A Survey on DDOS Attack in Manet
IRJET- A Survey on DDOS Attack in Manet
IRJET Journal
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
Janet Robinson
 
Web-style Wireless IDS attacks, Sergey Gordeychik
Web-style Wireless IDS attacks, Sergey GordeychikWeb-style Wireless IDS attacks, Sergey Gordeychik
Web-style Wireless IDS attacks, Sergey Gordeychik
qqlan
 
Security of software defined networking (sdn) and cognitive radio network (crn)
Security of software defined networking (sdn) and  cognitive radio network (crn)Security of software defined networking (sdn) and  cognitive radio network (crn)
Security of software defined networking (sdn) and cognitive radio network (crn)
Ameer Sameer
 
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsLayered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Editor IJCATR
 
IJSRED-V2I1P29
IJSRED-V2I1P29IJSRED-V2I1P29
IJSRED-V2I1P29
IJSRED
 

Similar to Welcome to International Journal of Engineering Research and Development (IJERD) (20)

Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
RAZORPOINT SECURITY GLOSSARY
RAZORPOINT SECURITY GLOSSARYRAZORPOINT SECURITY GLOSSARY
RAZORPOINT SECURITY GLOSSARY
 
Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)
 
Communications Technologies
Communications TechnologiesCommunications Technologies
Communications Technologies
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
 
Unit 6
Unit 6Unit 6
Unit 6
 
Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.
 
Security Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iSecurity Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11i
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layer
 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final ppt
 
Network Security_Module_2.pdf
Network Security_Module_2.pdfNetwork Security_Module_2.pdf
Network Security_Module_2.pdf
 
IRJET- A Survey on DDOS Attack in Manet
IRJET-  	  A Survey on DDOS Attack in ManetIRJET-  	  A Survey on DDOS Attack in Manet
IRJET- A Survey on DDOS Attack in Manet
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 
Web-style Wireless IDS attacks, Sergey Gordeychik
Web-style Wireless IDS attacks, Sergey GordeychikWeb-style Wireless IDS attacks, Sergey Gordeychik
Web-style Wireless IDS attacks, Sergey Gordeychik
 
Security of software defined networking (sdn) and cognitive radio network (crn)
Security of software defined networking (sdn) and  cognitive radio network (crn)Security of software defined networking (sdn) and  cognitive radio network (crn)
Security of software defined networking (sdn) and cognitive radio network (crn)
 
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsLayered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
 
IJSRED-V2I1P29
IJSRED-V2I1P29IJSRED-V2I1P29
IJSRED-V2I1P29
 

More from IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
IJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
IJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
IJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
IJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
IJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
IJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
IJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
IJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
IJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
IJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
IJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
IJERD Editor
 

More from IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Recently uploaded

Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 

Recently uploaded (20)

Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 

Welcome to International Journal of Engineering Research and Development (IJERD)

  • 1. International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 6, Issue 9 (April 2013), PP. 48-52 48 Robust Encryption and Decryption (RED) Component and Standard Encrypt Syntax (SES) For Web Services Security Architecture Abhilash R1 , Saravanan E2 ,Kalpana G3 1 M.Tech,Information Security and Cyber Forensics, Dr.M.G.R. Educational and Research Institute University 2 Asst.Professor, Dr.M.G.R. Educational and Research Institute University 3 Asst.Professor, Dr.M.G.R. Educational and Research Institute University Abstract:- With changes in technological landscape the threats and vulnerabilities in network are rising at an alarming rate. There are many complexities specific to, and inherent in Web services that further complicate their security. Numerous threats can compromise the confidentiality, integrity, or availability of a Web service or the back-end systems that a Web service might expose. This paper discusses re-modeling web services security architecture from security attacks such as network security attacks, E-Commerce attacks and man in the middle attacks. A detailed conceptual framework is proposed, based on how safely to send valuable packets to the destination without any security attacks. This framework is based on providing a Robust Encryption and Decryption (RED) technique for web browser and the web server and Standard Encrypt Syntax (SES) to web application. Keywords:- Web Security, Threats and Vulnerabilities in web, Cryptography, Web Security Architecture I. INTRODUCTION Today, there is an ever-growing dependency on computer networks for business transactions. With the free flow of information and the availability of vast resources, users of enterprise networks have to understand all the possible threats. These threats[3,9] take many forms; but all result in loss of privacy to some degree and possibility of malicious destruction of information or resources, that can lead to large monetary losses. Though many countermeasures are in place taken to provide secure internet, there are still some holes in the network which lead to severe security attacks[7]. This paper discusses the holes in the network and provides a detailed conceptual framework to avoid these threats and vulnerabilities. II. SECURITY THREATS AND VULNERABILITIES IN WEB SERVICES When we surf the Web, or send E-Mail, the communications between our computer and the server takes place via the data packet. It is the data packet that contains the information and the request for information that is sent from our computer to other computers over the Internet. The communication protocol which is used to govern the flow of data packets is called Transmission Control Protocol/Internet protocol or TCP/IP for short. A. Eavesdropping Eavesdropping, a network packet capturing application that collates and displays all packets in a user understandable format that passes in communication channel. Intruder understands and gain information about the packet. A sample skype Trojan source snippet: If (fPFWCircumventionStatus [mCircumventionType] (mGetBuffer, mProxyCon REQUEST_TYPE_SYSTEMUP) != 0) Sleep(NOCONNECTIVITYSLEEP); else{ remoteStatusChecks(mGetBuffer); mConnectivity=1; }} B. TCP Hijacking Weakness in creating TCP connections will open way for new attacks such as TCP/IP hijacking. TCP/IP hijacking technique[4] uses spoofed packets to take over a connection between a victim and a host
  • 2. Robust Encryption and Decryption (RED) Component and Standard Encrypt… 49 machine. It is successfully done by predicting intial sequence number that gets exchanged between victim and host. C. Session hijacking Session tokens are passed between client and server when server authenticates a client during login. Attackers hijack these session tokens and use it to acquire unauthorized access to web server. <?php If(isset($_REQUEST[“cmd”])) { Sf=fopen(“stolen.txt”,”w+”); fwrite(Sf,$_REQUEST[“cmd”].”<br>”); fclose(sf); } D. Network sniffing It is a technique of capturing network packets that are transferred in communication links. It captures all network packets and provides clear information about packets to intruder which results in attacks like eavesdropping, man-in-the-middle attack. Sample code for incoming traffic on all ports WSAIoct1(thisSocket, &inn, sizeof(inn), &out, sizeof(out)) III. EXISTING SYSTEM A. SSL/TLS Certificate: SSL[8] is an encryption technology that provides secure communication between client and server by encrypting packet information and link. It involves  SSL Server Authentication  SSL Client Authentication  An Encrypted SSL Connection It protects data passed between communication links from network attacks such as sniffing, spoofing, data tampering. These certificates are issued by third party companies. B. Disadvantages of SSL 1. SSL reduces site speed: SSL can reduce the time it takes for data to travel between the user and website by two to ten times. Moreover it increases network traffic by 300 percent. 2. SSL costs money: The cost of SSL is more which looks very expensive for single one who maintains site. 3. SSL isn’t secure: As day-by day many attacking techniques evolves, SSL fails to provide security. 4. SSL regular renewal: SSL certificates have to be renewed regularly and it fails if renewal is not done on time. 5. Complex installation of SSL: Installing process of SSL is very complex. IV. COUNTERMEASURES: RE-MODELING WEB SERVICES SECURITY ARCHITECTURE The key to effective Web services security[11] is to know the threats as described previously, understand the technical solutions for mitigating these threats, and then establish and follow a defined engineering process that takes security into consideration from the beginning and throughout the Web service life cycle. This process can be established in the following two steps: 1. Deployment of Robust Encryption and Decryption Entity [RED] for Browser and Web Server 2. Deployment of Standard Encrypt Syntax A. Robust Encryption and Decryption Entity [RED] for Browser and Web Server A detailed conceptual framework is proposed on how safely to send valuable packets to destination without any security attacks related to web services. This proposed framework is based on providing a common encryption and decryption component that should be deployed in both web browser and the web server. 1. RED Component: A set of common standard encryption algorithm such as RSA, DES could be grouped together as a component and be deployed in both web server and web browser. This could be done by adding
  • 3. Robust Encryption and Decryption (RED) Component and Standard Encrypt… 50  Add-on service  Updating the browser/server Every Algorithm has its own unique id in RED. For eg: RSA id=3341 Standard Encrypt Syntax in the code calls a particular algorithm from RED to encrypt or decrypt a page. 2. Deployment of RED In Browser: Communication between browser [10] and RED is given below. Fig 1.2: Communication between Browser and RED 3. Deployment of RED in Web Server: Communication between Server and RED, before and after a web page is uploaded in to server. Fig 1.1: Communication between User, Server and RED B. Deployment of SES Standard Encrypt Syntax (SES) will be a common code embedded in any programming language to communicate with RED in browser and server. 1) The syntax for accessing RED: <SES id=”Encryption Algorithm ID” name=”User defined Encryption name” key=”key_name”> </SES> For every request been processed, RED encrypts or decrypts from the algorithm and key referred in SES tag. 2) Algorithm with no key exchange: <SES id=”Encryption Algorithm ID” name=”User defined Encryption name” key=”no-key”> </SES> 3) Algorithm with single key exchange: <SES id=”Encryption Algorithm ID” name=”User defined Encryption name” key=”key_name”> </SES> 4) Algorithm with multiple key exchanges: Cryptographic algorithm with a multiple key[2] could be represented as, <SES id=”Encryption Algorithm ID” name=”User defined Encryption name” key=”key_name1, key_name2,key_name3….”></SES> 5) Public Key Algorithm: Public key Cryptographic algorithm[1] with private key and public key <SES id=”Encryption Algorithm ID” name=”User defined Encryption name” publickey= ”key_name” private-key=”key_name”></SES>
  • 4. Robust Encryption and Decryption (RED) Component and Standard Encrypt… 51 C. Working of RED The web developer after designing a webpage can use an encryption algorithm from RED which could be added as a tag in the webpage. While hosting the webpage to the server, the developer is intimated for choose of any cryptographic algorithm. Therefore, before a data is been send to communication channel, it encrypts with above mentioned algorithm and send. Fig 1.1: Robust Encryption and Decryption Component for Web Browser and Web Server Similarly, when server response to a user, data is encrypted. Browser decrypts the content of the page by same cryptographic algorithm which is mentioned in the SES tag. D. From Developer’s Perspective: There are certain options could be implemented from developer’s perspective: 1) Determine a suitable encryption algorithm from RED Developer can choose any algorithm [6] of his choice suitable for his webpage from RED. Developer need not be a cryptographer. Implementing a cryptographic algorithm is done by adding a small SES tag in to his web page. 2) Encrypt Priority fields Encryption and Decryption technique can possibly place a high load on the server/client proportionate to the size of the webpage. Considering a webpage with content larger than 2mb, there is a possibility of time delay in loading the content of the webpage. In order to reduce the time in loading and to provide more efficiency, the developer can encrypt a part of a webpage which he is going to give more priority. It may be a form field or a table of content. Encryption is done on priority basis. For instance consider an E-Commerce website. The Developer gives more attention on form fields and transaction links. Therefore he can encrypt that part of priority areas. <body> <div>…….</div> <SES id=”2233” name=”Caesar” key=”no-key”> <div> <form>…..</form></div> </SES> V. ADVANTAGES 1. Deploying RED component is done by simple updating or through add-ons. 2. Accessing RED is done by simple SES tag that is supported by RED. 3. Another advantage over sniffers is after the user types his username and password and clicks send, the username and passwords are encrypted and sent via packets. If an intruder tries to capture and view the packet
  • 5. Robust Encryption and Decryption (RED) Component and Standard Encrypt… 52 information, there will be no possibility of identifying the actual information. This ensures more security on networks. 4. Instead going for paid secure services, this framework can bring security to entire network. VI. CONCLUSION Due to enormous threats and vulnerabilities, there is a desperate need for some standards that should prevent and deter the attackers. Implementing this Robust Encryption and Decryption component and Standard Encrypt Syntax will add a higher level of security to the communication channel. REFERENCES [1] V. Shoup, “A proposal for an ISO standard for public key encryption”, http://eprint.iacr.org/2001/112, 2001. [2] S. S. Al-Riyami and K. G. Paterson. “Authenticated three party key agreement protocols from pairings.” Cryptology e-Print Archive, http://eprint.iacr.org/2002/035/ [3] R. C. Summers, “Secure Computing” – Threats and Safeguards, McGraw-Hill, 1997 [4] CERT, “TCP SYN Flooding and IP Spoofing Attacks”, Carnegie Mellon University, Sept. 1996 [5] Eastlake and P. Jones, US Secure Hash Algorithm 1 (SHA1), IETF RFC 3174, Sept. 2001. [6] Choosing an encryption algorithm: technet.microsoft.com/en-us/library/ms345262.aspx [7] Common types of network attacks: http://technet.microsoft.com/en-us/library/cc959354.aspx [8] Understanding of digital certificates and SSL: http://www.entrust.net/ssl- resources/pdf/understanding_ssl.pdf [9] Web security threats: http://www.gfi.com/whitepapers/GFI-Web_Based_Threats_v2_Whitepaper.pdf [10] Browser security and privacy: http://www.securingthehuman.org/newsletters/ouch/issues/OUCH- 201111_en.pdf [11] Bhandari R, Suman U, “Generalized Framework for Secure Web Service Composition”