INVESTIGATING BRUTEFORCE AND TIMING ATTACK IMMUNITY IN PROPOSED WORK

Authors

  • Yashpal Research Scholar, CSE Department, IIET Kinana
  • Deepika Mahal HOD (CSE), CSE Department, IIET Kinana

Keywords:

tools and technology, BRUTEFORCE and TIMING, enhancement, TIMING ATTACK

Abstract

This paper discusses the enhancement of security in order to tack the BRUTEFORCE and TIMING ATTACK in networked environment. The proposed work has provided more secure approach as compare to traditional security mechanism. This paper discusses the tools and technology used to implement proposed work. The results of simulations represent that the proposed work is more immune to BRUTEFORCE and TIMING attack as compare to tradition system.

References

. Bhawan Bhardwaj,2 Ankur Mittal, “ADVANCED MECHANISMS TO SECURE WIRELESS AD HOC NETWORK WITHPERFORMANCE ANALYSIS” ISSN: 2278-6848, Volume: 08 Issue: 08 ,October - December 2017

. Shahriar Mohammadi, Reza Ebrahimi Atani, Hossein Jadidoleslamy, “A Comparison of Link Layer Attacks on Wireless Sensor Networks”, Journal of Information Security, April 2011, pp. 69-84.

Wajeb Gharibi, Maha Shaabi, “Cyber threats in social networking websites”, International Journal of Distributed & Parallel Systems (IJDPS), Vol.3, No.1, January 2012, pp. 119-126.

. Rupam, Atul Verma, Ankita Singh, “An Approach to Detect Packets Using Packet Sniffing, International Journal of Computer Science & Engineering Survey (IJCSES) ,Vol.4, No.3, June 2013, pp.21-33.

. Sharmin Rashid, Subhra Prosun Paul, “Proposed Methods of IP Spoofing Detection & Prevention, International”, Journal of Science & Research (IJSR), Volume 2, Issue 8, August 2013, pp.438-444.

. Mohan V. Pawar, Anuradha J, “Security of network and Types of Attacks in Network”, International Conference on Intelligent Computing, Communication & Convergence, 2015, pp. 503 – 506.

. MANJIRI N. MULEY, “ANALYSIS FOR EXPLORING THE SCOPE OF NETWORK SECURITY TECHNIQUES IN DIFFERENT ERA: A STUDY”, International Journal of Advanced Computational Engineering and Networking, Volume-3, Issue-12, Dec.-2015, pp. 33-36.

. Ankit Mehto, Prof. Hitesh Gupta, “A Review: Attacks and Its Solution over Mobile Ad-Hoc Network”, International Journal of Engineering Trends and Technology (IJETT), Volume 4, Issue 5, May 2013, pp. 2009-2011.

. Ms.Neha KamdarAssistant Professor, Vinita Sharma Assistant Professor, Sudhanshu Nayak Assistant Professor, “A Survey paper on RFID Technology, its Applications and Classification of Security/Privacy Attacks and Solutions”, International Journal of Computer Science and Information Technology & Security (IJCSITS), Vol.6, No4, July-August 2016, pp.64-68.

. P.ARUNA DEVI, S.RANI LASKHMI, K.SATHIYAVAISHNAVI, “A Study on Security of network Aspects and Attacking Methods”, International Journal of P2P Network Trends and Technology, Volume3, Issue2, 2013, pp. 97-103.

Downloads

Published

30-09-2018

How to Cite

Yashpal, & Deepika Mahal. (2018). INVESTIGATING BRUTEFORCE AND TIMING ATTACK IMMUNITY IN PROPOSED WORK. International Journal for Research Publication and Seminar, 9(4), 27–36. Retrieved from https://jrps.shodhsagar.com/index.php/j/article/view/1345

Issue

Section

Original Research Article