Svoboda | Graniru | BBC Russia | Golosameriki | Facebook
Skip to main content
Internet users and its usage have grown almost exponentially during last decade. Most of the web applications contain both private(sensitive) and public information in theircorresponding database that brings the security of private... more
Internet users and its usage have grown almost exponentially during last decade. Most of the web applications contain both private(sensitive) and public information in theircorresponding database that brings the security of private information on the forefront of the challenge of this domain. Cyber criminals can attempt to stealor tamperwith private information from these insecure or vulnerable web applications by exploiting. In this paper, we have analyzed different approaches of web application security used in current practices since their development such as secure coding, Web Application firewall, vulnerability assessment and penetration testing. In addition, we have also discussed various approachesand repositories which support vulnerability assessment and penetration testing processes.
By taking advantage of vulnerability, Cyber criminals is easily able to steal confidential data of the ICT, results in heavy loss. Vulnerability Assessment and penetration testing is a special approach to eliminate various security... more
By taking advantage of vulnerability, Cyber criminals is easily able to steal confidential data of the ICT, results in heavy loss. Vulnerability
Assessment and penetration testing is a special approach to eliminate various security threats from the web application. By focusing high risk vulnerability such as SQL Injection, Cross Site Scripting, Local File Inclusion and Remote File Inclusion, in this paper, we have surveyed literatures to study the general mechanics of VAPT process and gather tools which can be useful during VAPT process.
Blockchain is one of the latest trends in Information Technology domain. It has changed a way of thinking for IT professional. Companies are focusing on implementation of blockchain with their services to ensure security and reliability.... more
Blockchain is one of the latest trends in Information Technology domain. It has changed a way of thinking for IT professional. Companies are focusing on implementation of blockchain with their services to ensure security and reliability. Still they are facing challenges and issues for development and implementation of blockchain based services. This paper discusses those issues and challenges to be considered in development and implementation.
With the increased usage of cloud computing, there is a need to address the security issues also. No. of techniques have been proposed and is there in use. Still there are few problems related to authentication in cloud environment. This... more
With the increased usage of cloud computing, there is a need to address the security issues also. No. of techniques have been proposed and is there in use. Still there are few problems related to authentication in cloud environment. This paper throws a light on such problems and their solution with the use of Biometric techniques. I. INTRODUCTION In the era of internet, it is required to maintain security of the resources as well as transaction of data online. In the current era of internet, we are still using password authentication mechanism for authentication and authorization of the user. But it is required to have more robust and more secure mechanism. Another problem with password mechanism is to remember many accounts on the internet and also remembering password of each. Instead of that we can go for biometric authentication for internet user authentication services. Till this date, biometric services are being used for personal verification in organizations as server based or standalone systems. But in the emerging era of cloud computing, it needs to be implemented, so that we can have more processing capabilities with increasing number of users and more system storage capabilities and can maintain unique identity of the users. If we consider the example of UID – Aadhaar card, behind which the objective is to maintain single identity proof of the Indian national, they also require to store fingerprints data of all the users as well as facial database. The same database can be used by different authorities of Indian Government for various legal purposes.
Managing the location information is the most important aspect in Cellular Networks. This is even more important when the user is in moving condition (mobile). In today's world with the invention of latest mobile devices, the mobile... more
Managing the location information is the most important aspect in Cellular Networks. This is even more important when the user is in moving condition (mobile). In today's world with the invention of latest mobile devices, the mobile device is not just a medium for communication but it is a replacement of the whole office. A person can read / write mails, do social networking, merchant transactions and a lot more through mobile devices. To handle all this tasks effective Location management in cellular communication is 100% needed. If the location of the user is not known then it will be difficult to perform call / sms / mobile data / other transactions with the cellular phone. Study of various location update strategies also covered in this paper. Algorithm for finding best location update strategy among all available strategies. Algorithm and simulation results given for Dynamic Time Based Location Update Strategy.
Security is one of the most important aspects in today’s computer environment. Especially, person authentication now a day is necessary to maintain security of computer based systems. Biometric authentication methods are becoming popular... more
Security is one of the most important aspects in today’s
computer environment. Especially, person authentication now
a day is necessary to maintain security of computer based
systems. Biometric authentication methods are becoming
popular since last decade. Face recognition is one of the
mature and popular biometric authentication methods. Today,
with this paper, discussion on identifying best suitable
samples for generating training database has been done. PCA
based face recognition approach using Eigenface method has
been discussed for the said purpose
Research Interests:
Biometric systems are getting popularity since last decade. As per the demand of IT industry, this technology is satisfying authentication and authorization needs. But Unimodal Biometric systems have their own limitations. To overcome... more
Biometric systems are getting popularity since last decade. As per the demand of IT industry, this technology is satisfying authentication and authorization needs. But Unimodal Biometric systems have their own limitations. To overcome the limitations of Unimodal Biometric Systems, we can choose the approach of Multimodal Biometric Systems. In this paper, researchers have given details about Multimodal Biometric system designed and developed to improve success ratio of authentication. They have adapted fingerprint and face recognition methods with match score level fusion. We have tried to identify success ration under various combinations of weights assigned to fingerprint and face match scores.
Research Interests:
The term cloud computing is a relatively recent vintage. In the year of 2008, this term came in popularity. Since then, this term has emerged a lot within short span of time. As it is known fact of IT industry that every emerging... more
The term cloud computing is a relatively recent vintage. In the year of 2008, this term came in popularity. Since
then, this term has emerged a lot within short span of time. As it is known fact of IT industry that every emerging
technology brings some issues and challenges, this is also true for Cloud Computing Environment. In this paper,
authors have tried to throw some light on above said topic especially on SaaS.
Research Interests:
Research Interests:
Research Interests:
Biometrics is becoming necessity for security issues in Information Technology trend. Authentication and authorization purposes can be served efficiently and effectively with biometric techniques. But sometimes unimodal biometric systems... more
Biometrics is becoming necessity for security issues in Information Technology trend. Authentication and authorization purposes can be served efficiently and effectively with biometric techniques. But sometimes unimodal biometric systems (systems using one biometric trait) may not serve purpose because of various reasons. Mutibiometric systems resolve the issues which cannot be addressed using unimodal biometric systems. The author has presented comparison of various multibiometric systems in this paper.
Research Interests: