Efficient User Authentication and Providing Host Security against Malware

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 5

Abstract

To improve the trustworthiness of a host and system data cryptographic verification technique is used. From these approach users keystroke to identify the legitimate user’s to get the service from the server by using integrity verification and malicious traffic detection. But the main issue of this approach is keystroke hacking by the bots or autonomous program. The key logger’s records the user’s password or security code and send to the hacker to login the service when the user is no longer online. This project aims to propose a malware detection approach based on the characteristic behaviour of human user’s. Finally explore the human-bots differences by using TUBA (Telling hUman and Bots Apart) thereby prevent bots forgeries. By using classifier algorithm the current work identify the human and malware activities.

Authors and Affiliations

P. Angel , V. Sindhu Shri

Keywords

Related Articles

Creation of Load Balanced Mail Server Management System Using Cloud Computing

This system facilitates mailing among the users of an internet, having an efficient and easy to communicate with telecommunications. The mails are transmitted and receiving by individual users registered in a mail manage...

Advanced Vehicle Tracking System on Google Earth Using GPS and GSM

Vehicle navigation is one of the most important applications in the era of navigation which is mostly used by drivers. Therefore the efficiency of the maps given to the drivers has a great importance in the navigation sy...

Tracking Down Travel Agencies Geo-location using Software Engineering - Ml II Function Point Analysis

The location of individual travel agency around every corner by its respective database source in which the customers book their destination. The user details been fetched with their IP and Based on the latitude and long...

A Comparative study Between Fuzzy Clustering Algorithm and Hard Clustering Algorithm

Data clustering is an important area of data mining. This is an unsupervised study where data of similar types are put into one cluster while data of another types are put into different cluster. Fuzzy C means is a very...

WLan Architecture

It is the review paper of Architecture of Wireless local area networks. In this paper we are discussing the architecture of wlan. A wireless LAN (WLAN) is a local area network based on wireless technology. Most modern lo...

Download PDF file
  • EP ID EP121286
  • DOI -
  • Views 105
  • Downloads 0

How To Cite

P. Angel, V. Sindhu Shri (2014). Efficient User Authentication and Providing Host Security against Malware. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 9(5), 255-259. https://www.europub.co.uk/articles/-A-121286