INVESTIGATING BRUTEFORCE AND TIMING ATTACK IMMUNITY IN PROPOSED WORK
Keywords:
tools and technology, BRUTEFORCE and TIMING, enhancement, TIMING ATTACKAbstract
This paper discusses the enhancement of security in order to tack the BRUTEFORCE and TIMING ATTACK in networked environment. The proposed work has provided more secure approach as compare to traditional security mechanism. This paper discusses the tools and technology used to implement proposed work. The results of simulations represent that the proposed work is more immune to BRUTEFORCE and TIMING attack as compare to tradition system.
References
. Bhawan Bhardwaj,2 Ankur Mittal, “ADVANCED MECHANISMS TO SECURE WIRELESS AD HOC NETWORK WITHPERFORMANCE ANALYSIS” ISSN: 2278-6848, Volume: 08 Issue: 08 ,October - December 2017
. Shahriar Mohammadi, Reza Ebrahimi Atani, Hossein Jadidoleslamy, “A Comparison of Link Layer Attacks on Wireless Sensor Networks”, Journal of Information Security, April 2011, pp. 69-84.
Wajeb Gharibi, Maha Shaabi, “Cyber threats in social networking websites”, International Journal of Distributed & Parallel Systems (IJDPS), Vol.3, No.1, January 2012, pp. 119-126.
. Rupam, Atul Verma, Ankita Singh, “An Approach to Detect Packets Using Packet Sniffing, International Journal of Computer Science & Engineering Survey (IJCSES) ,Vol.4, No.3, June 2013, pp.21-33.
. Sharmin Rashid, Subhra Prosun Paul, “Proposed Methods of IP Spoofing Detection & Prevention, International”, Journal of Science & Research (IJSR), Volume 2, Issue 8, August 2013, pp.438-444.
. Mohan V. Pawar, Anuradha J, “Security of network and Types of Attacks in Network”, International Conference on Intelligent Computing, Communication & Convergence, 2015, pp. 503 – 506.
. MANJIRI N. MULEY, “ANALYSIS FOR EXPLORING THE SCOPE OF NETWORK SECURITY TECHNIQUES IN DIFFERENT ERA: A STUDY”, International Journal of Advanced Computational Engineering and Networking, Volume-3, Issue-12, Dec.-2015, pp. 33-36.
. Ankit Mehto, Prof. Hitesh Gupta, “A Review: Attacks and Its Solution over Mobile Ad-Hoc Network”, International Journal of Engineering Trends and Technology (IJETT), Volume 4, Issue 5, May 2013, pp. 2009-2011.
. Ms.Neha KamdarAssistant Professor, Vinita Sharma Assistant Professor, Sudhanshu Nayak Assistant Professor, “A Survey paper on RFID Technology, its Applications and Classification of Security/Privacy Attacks and Solutions”, International Journal of Computer Science and Information Technology & Security (IJCSITS), Vol.6, No4, July-August 2016, pp.64-68.
. P.ARUNA DEVI, S.RANI LASKHMI, K.SATHIYAVAISHNAVI, “A Study on Security of network Aspects and Attacking Methods”, International Journal of P2P Network Trends and Technology, Volume3, Issue2, 2013, pp. 97-103.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2018 International Journal for Research Publication and Seminar
This work is licensed under a Creative Commons Attribution 4.0 International License.
Re-users must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. This license allows for redistribution, commercial and non-commercial, as long as the original work is properly credited.