Loading...
  • Home
  • Search Results
1813-1814 of 4327 Papers

SECURITY NETWORK WITH VIRTUAL PRIVATE NETWORK & (IPSEC) APPLICATIONS

Published In: INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER SCIENCE AND ELECTRONICS ENGINEERING
Author(s): AHMED A. SABEEH , DHARI KH ABEDULA

Abstract: Internet communication is largely based on TCP/IP protocols. The main design of TCP/IP is for trusted peers to communicate. IP Packets have no inherent security, and therefore it is relatively easy to forge the addresses of IP packets, modify the contents of IP packets, replay old packets, and inspect the contents of IP packets in transit. In this paper, we discuss how Internet Protocol Security (IPSec) is used for secured and encrypted communication between Internet hosts. IPSec is described as an end-to-end security scheme operating in the Internet Layer of the Internet Protocol Suite[1]. According to Kent et al., it can be used in protecting data flows between a pair of hosts (host-to-host), between a pair of security gateways (network-to-network), or between a security gateway and a host (network-to-host). To discussthe use of IPSec in an TCP/IP based network, we chose Virtual Private Network (VPN) as the application in describing how IPSec provides the platform for secure and encr

  • Publication Date: 09-Mar-2014
  • DOI: 10.15224/978-1-63248-000-2-33
  • Views: 0
  • Downloads: 0

ALGORITHM FOR TRACKING SENSITIVE INFORMATION OF ONLINE APPLICATION IN COMPUTER MEMORY

Published In: INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER SCIENCE AND ELECTRONICS ENGINEERING
Author(s): JAFREEZAL JAAFAR , AHMAD KAMIL MAHMOOD , KHAIRUL AKRAM ZAINOL ARIFFIN , SOLAHUDDIN SHAMSUDDIN

Abstract: With the advance in technology and the introduction of cloud computing, the usage of Internet application has been increased rapidly. In addition, the online storages with password protected such as Dropbox, Box Sync, Copy and Cloud Me are already available to all users. Hence, with a rapid development and introduction of this technology, the analysis on the hard drive has become obsolete in retrieving the information from those applications. The aim of this paper is to present an algorithm to track the sensitive information from online application for both active and exile process in the computer memory. The algorithm encompasses the signature search to find the possible processes in the memory, obtain the user and machine data and then some sensitive information with regard to the online application. The algorithm will be independent of address translation algorithm that has been frequently applied in the retrieving technique in the past.

  • Publication Date: 09-Mar-2014
  • DOI: 10.15224/978-1-63248-000-2-34
  • Views: 0
  • Downloads: 0