Journal of Computer, Internet and Network Security [ISSN: 2457-0176 (online)]

Archives

2021

Vol 6, No 1 (2021): Discovery of Cyberbullying in the Interpretation of Sarcasm

Authors:-Mudit Goswami, Sheena Verma

Abstract:-Because of the rise in social media usage, cyberbullying detection has gotten a lot of attention recently. The current methods identify bullying by weighing the importance of cuss words, cursing, the quantity of negativity in phrases, and other factors, but they ignore sarcasm as a form of bullying. We want to identify sarcasm in cyberbullying documents in this work. We've constructed a database that can be used to identify sarcastic documents. Following that, we present a Neural Network constructed on top of an embedding layer that reveals what constitutes a phrase ironic bullying. Traditional ML approaches such as SVM, Logistic regression, Naive Bayes, Decision trees, Ensemble Method, and Random Forest classifiers have an accuracy of 79-89 percent in the trial. The Neural Network, on the other hand, achieved an accuracy of 81 percent. Traditional ML approaches outperformed NN, which might be attributed to the smaller dataset.

Vol 6, No 1 (2021): Survey Paper on Network Security and Cryptography

Author: Rashmi

Abstract: The internet has undoubtedly become a huge part of our lives. Many people in today’s generation rely on the internet for many of their professional, social and personal activities. In the modern era, evaluation of networking and wireless networks has come in information and communication technology; many things give the facility a chance to deal with this technology using the internet. At present each & everyone uses the advantage of internet. But, this may lead to several problems related to our data security, such as confidentiality, integrity, and availability, which can be termed as the three most important security goals. To be secured, information needs to be hidden from unauthorized access, protected from unauthorized change, and available to an authorized entity when it is needed. Thus, cryptography plays an important role in providing security to the networks and user data. In this survey paper, we have discussed the importance of cryptography regarding network security issues and the various methodology employed by cryptography.

Vol 6, No 1 (2021): Crime Prediction and Reporting System

Authors: Jay Bhanushali, Karan Bhanushali, Darshil Hariya, Theres Bemila Jenet

Abstract: The increasing rate of criminal activities is a growing concern for any particular country/region. The proposed system intends to develop a user-friendly web application for the stake-holders such as Invigilators, NGOs, and end-users. The system establishes a simple relation between the above-mentioned stake-holders where any individual user can report a crime without himself going to the police station. The invigilators then can track the complaint and give an option to the NGO for Rehab. Also, this system analyse crime data of India scrapped through various websites. The main focus is to predict the crime which is most likely to occur in the near future using various Machine Learning models. The parameters which will be required for the proposed model are timestamp which includes hours, days, months, years, geographical location, i.e., latitude & longitude and the type of crime that occurred. The proposed system implements various historical Machine Learning algorithms like KNN (K- nearest neighbours), Decision trees and Random forest. The goal is to analyse the surges and the hotspots of the crime so that it is efficient for officials to enhance security in such locations. To get a clear understanding of the patterns of criminal behaviour, this will help to carry the investigation sooner. The existing system predicts the different crime categories in different locations using similar historical Machine Learning models like Naïve Bayes, Decision Tree, etc. The proposed system attempts to make the classification work more sensible by merging similar classes into larger classes. Finally, the proposed system also provides an opening for future work like a prediction of the crime rate in the near future.

Vol 6, No 1 (2021): A Survey Paper on Cloud Security

Authors: Ramya, Shilpa Shanubhog

Abstract: Cloud computing is an internet–based computing service in which large groups of remote servers are networked to allow centralized data storage and online access to computer services or resources.

Cloud computing is not a totally new concept; it has a complicated connection to the grid computing paradigm and other related technologies such as utility, cluster and distributed systems. Here we present an analysis of security issues in a cloud atmosphere. This paper introduces the background and service model of cloud computing. Along with this, some of the security issues and challenges are also underlined.

 

Vol 6, No 1 (2021): Comparative Study: Sentimental Analysis on Facebook Comments Using Classification

Authors: M. Balamurugan, S. Muthukumar, S. Narayana Moorthy

Abstract: Sentiment Analysis is the computational examination of the end user’s options, Attributes and emotions to words is a particular topic or product. Sentiment analysis classifies the message according to its polarity, whether it is positive, negative, neutral. Recently researchers focused on machine learning-based methods for sentiment analysis of social media posts. Social media is a micro blogger site in which end users can post their comments in slag language that contains a symbol, idioms, misspelled words and sarcastic suntans. Social media data also have anise of dimension problem high Dimension neuter of data that required specific pre-processing and feature extraction, leading to improved classification accuracy. This paper present a comprehensive of sentiment analysis Technique based on record research and subsequence explores machine learning (SVM, KNN, Naive Bayes) and feature extraction technique of sentiment analysis further Facebook dataset are used calculate on accuracy and visualization data extraction used tool in RStudio and accuracy are also calculated in machine learning algorithms.


2020

Vol 5, No 3 (2020): System for Detecting and Preventing Swearing through the Use of Type-ahead Scripts

Authors: Kashish Saxena, Sakshi Bisht, Rahul Verma

Abstract: The Internet is becoming increasingly prevalent in consumers' day-to-day activities. Online social networks (OSN) have exploded in popularity in recent years. Users can use online social networking services to communicate and share their thoughts and content (OSN). Users should be able to share a variety of content types, such as images, audio, and video. The lack of privacy for the users' own private space is the main disadvantage of these Online Social Networking (OSN) services. Users must not be able to exercise direct control over their own private walls in order to prevent unwanted messages from being posted. Online Social Networks (OSN) have become a significant part of many people's lives in recent years. As a result, Online Social Networks (OSN) should be highly secure in order to protect people's privacy. Until now, the security measures provided by the Online Social Network (OSN) have been limited. This paper proposes an enhanced filtering system based on content filtering that uses machine learning to filter unwanted messages.

Vol 5, No 3 (2020): Wireless Bluetooth Technology: A Conceptual Framework

Authors: Kavita Singh, Gurmeet Kaur

Abstract: Bluetooth technology, also known as Personal Area Network (PAN) technology, is a widely used wireless technology that offers a number of benefits, including cheap cost and low power consumption, as well as speech and data transmission anywhere within range. Bluetooth is a type of short-range radio. This technique replaces the cords that are ordinarily needed to link one gadget to another. Rather to using wires, we may use Bluetooth to connect numerous devices to the laptop or computer, such as a wireless mouse, wireless keyboard, and wireless headphones. This article provides details on some of the benefits, architecture, and applications of wireless Bluetooth technology.

Vol 5, No 3 (2020): An Examination of Search Engine Optimization Strategies and Implementations

Author: Shanaya Gupta

Abstract: This article offers a comprehensive review of the various SEO tools and approaches. Search engines are programmes that are used to find information on the internet. The primary goal of every website is to list all of the links at the top. The art of improving a website's exposure in the main body of search engine results is known as SEO. Using the strategies and solutions available on the market, this art of boosting a website's visibility in the body of search engine results is promising.

Vol 5, No 3 (2020): Enhanced ARF Tree to Retrieve Attribute-based Documents in Cloud Computing

Authors: P. Santosh, K.Gayathri

Abstract: One of the most sought-after research directions in cloud computing is secure document storage and retrieval. Despite the fact that various searchable encryption techniques have been proposed, only a small percentage of them offer skilled and productive recovery of documents that have been encrypted based on their properties. The primary goal of this project is to create a hierarchical attribute-based encryption method for document gathering. If the records are based on a coordinated access structure, a large number of them can be jumbled together. Both the cypher text storage space and the time costs of encryption/decryption are conserved when using the Cipher text-Policy Attribute-Based Encryption (CP-ABE) methods. A record structure known as the Attribute-based Retrieval Features (ARF) tree was created for the report gathering based on the TF-IDF display and the archives characteristics at that moment. For the ARF tree, a profundity first scan computation is designed to increase inquiry proficiency, which may be further enhanced by parallel processing. With the exception of report accumulations, our strategy may be applied to a variety of datasets by subtly altering the ARF tree. To demonstrate the security and efficacy of the suggested strategy, a thorough study and a series of tests are carried out.

 

Vol 5, No 3 (2020): Google Search Affecting the Human’s Intelligence

Authors: Vidushi Maheshwari, Dr. Surendra Yadav

Abstract: Since 1998 to current era, the ‘Google Search’ is a very common platform for getting information about everything. Whether a tricky question or mind is thinking something, the human fingers type the well-known word ‘google’, but as useful as it is, it is destroying the intelligence of brain and thinking process. There is lot of research and theories that google searching habits reduced the ability to think completely because all have to find even the smallest thing on it, but it is still a logical argument. This paper focuses all the logics, survey and theories proved by the survey, that the “Google search affecting the human’s intelligenceâ€.

Vol 5, No 2 (2020): Information and Computer Security in Block chain Technology

Author: Kshitiz Saxena

Abstract: One of the cornerstones of internet technology is security. Block chain is a relatively new technology that combines a number of different processes, including distributed, password-protected, decentralised, and programmed systems. There is no requirement for validation or certification by a third party. It is not necessary for block chain participants to know each other. The block chain technology ensures integrity by using asymmetric encryption techniques such 3 AES. It has a significant influence on information and network security in many social areas, including healthcare, banking, and so on. It keeps track of the data and distributes it via a distributed process. Because the integrity and authenticity are maintained, this technology is tamper-proof.

Vol 5, No 2 (2020): An Analysis of Cloud Network Robots Safety Measures

Author:- Shilpa Raj

Abstract:-The goal of this research is to look into the security precautions that can be taken when a network of robots accesses data and resources from a cloud. This research builds on previous work in the realm of cloud networked robotics. Cloud networked robotics draws on cloud computing and networked robotics for inspiration. Because this paper is about using the robot network to access cloud services (data and resources), a lot of effort should be put into ensuring data security throughout the data transmission process. In Section I, you'll learn about cloud computing, networked robots, and cloud robotics. Section II delves into the study's goal, namely, the necessity for security and the steps taken by the cloud when it receives a service request from the robot network. Section III provides a full analysis of the numerous instances for securing data transfer from the cloud to the robot network, as well as their uses, benefits, and drawbacks. The conclusion and future work of this research are presented in Section IV.

Vol 5, No 2 (2020): Contraptions to Avoid the Intricacies in Network Security Algorithm with Enhanced RSA and Hashing

Authors: Krithika G.M, Dr. B.G.Prasanthi                                   

Abstract: This paper consists of embedded network security in the field of "security" from a computer science point of view. It is composed to be accessible to key generation, authentication authorization with enhanced features in a single algorithm. Here in this paper, the proposed model embeds an enhanced RSA algorithm for key generation for authentication enhanced Kerberos and enhanced digital signature for authorization. First, we have started up with Enhanced RSA Algorithm. Here in this enhanced RSA, we take four prime numbers instead of two prime numbers to have more efficiency in the security and is proved with an algorithm.  It concludes with an overview of some actualized framework and an appraisal of the pragmatic utility of current techniques for security in networks by enhancing the RSA algorithm in order to find the best and optimal security solution to the given message.

Vol 5, No 2 (2020): Bitcoin: An Overview of the Innovative Decentralised Digital Currency

Authors:-Namitha P, Keerthijith P

Abstract:-The Internet has become so popular that most of the activities like communication, exchange of messages and commercial and non-commercial activities are carried out through it. Online payments and transactions are common procedures through the internet. Last decade there came a new form of currency called Bitcoin. Bitcoin is the most popular and decentralized digital currency. It is a fully distributed peer to peer system introduced as open-source software. The introduction of bitcoin almost changed the concept of the word currency. Blockchain is the public ledger used in bitcoin. A blockchain is where you store any data not publicly but semi-publicly in a linear container space, i.e., a block. The entire system is based on strong cryptographic concepts. This paper discusses bitcoin and its underlying concepts.

Vol 5, No 2 (2020): Descriptive Clustering of Documents on the Basis of Predictive Network

Authors: Prof. Suraj Shivaji Bhoite, Prof. Swapnali K. Londhe

Abstract: The mass of data obtainable, merely finding the IR is not only assignments of automatic text classification methods. Instead, the automatic text classification methods are supposed to retrieve the RI as well as organize according to it is a degree of relevancy with the given query. The main problem in organizing is to classify which document is relevant & which are relevant. The Automated text classification consists of automatically organizing clustered data.  We propose an automatic method of text classification using Machine Learning based on the disambiguation of the meaning. We use the word net word embedding algorithm to eliminate the ambiguity of words so that each word is replaced by its meaning in context. The closest ancestors of the senses of all the undamaged words in a given document are selected as classes for the specified document.

 

Vol 5, No 1 (2020): A Study on Cyber Security and Cyber Crime

Authors:-P.Kruthika

Abstract:-Now a day’s people predominantly using the internet services for all kind of activities such as net banking, EB bill payments, online shopping etc.., and also usage of social media is booming. In this point we have to be aware of cyber security and issues of cyber crime. Due to the lack of awareness user may be under sever threat by the hackers. Here the Cyber security plays a crucial role in the field of information technology. Various Government and Companies are in act to bring the solutions for the cyber crimes still it is being a contest to secure both IT operations and financial information. This paper overviews the concept of cyber security technologies, cybercrimes, ethics and the emerging trends.

Vol 5, No 1 (2020): A Review on Cryptography

Authors: Dr. A. Muthusamy, S. Reshma

Abstract: Security is the most difficult aspect within the web and network applications. Web and networks applications square measure growing in no time, that the importance and also the worth of the changed information over the net or alternative media varieties square measure increasing. Therefore, the look for the simplest answer to supply the mandatory protection against the information intruder’s attacks together with providing these services in time is one in every of the foremost attention-grabbing subjects within the security connected communities. Cryptography is the one in every of the most classes of pc security that converts info from its traditional kind into Associate in Nursing indecipherable kind. The two main characteristics that establish and differentiate one coding algorithmic rule from another square measure its ability to secure the protected information against attacks and its speed and potency in doing therefore.

 

Vol 5, No 1 (2020): Use and Impact of Electronic Resources by Faculty Members and Students of Post Graduate Engineering Colleges of Gujarat

Author: Nimesh Kantilal Jotangia

Abstract: This paper aims to assess and evaluate the use of e-resources by the students and faculty members of post graduate engineering colleges affiliated to GTU, with a view to examine the exposure of students and faculty members to e-resources. Besides, it aims to highlight the problems encountered by the users and suggests some remedial measures for its improvement. The author investigates the use of e-resources by the students and faculty members of post graduate engineering colleges through a survey based on a structured questionnaire. Various statistical methods have been used for data analysis. The study confirmed that students and faculty members are aware of the e-resources and various types of e-resources, e-database, and e-journals. A questionnaire was distributed among the students and faculty members to collect desired data. A total 1322 questionnaires were distributed to the users of 20 selected post graduate engineering colleges out of 59 colleges. The study found that the majority 786 (84.97%) of respondents out of 925 are aware about the availability of e-resources. The result reveals that 17.51 % of respondents want to access only electronic version whereas only 3.68% users want to use only printed resources, but maximum 78.81% respondents want to use both electronic and printed version. The analysis reveals that many of the respondents search e-resources through linking facility available on the library website.

Vol 5, No 1 (2020): Phishing Websites Detection Using Machine Learning in Python

Authors:-Aniket Sanjay Kumbhar, Pratik Rajendra Chougule, Karan Dinkar Phonde, Vinayak Vasant Pachange, S. P. Phadtare

Abstract:-Phishing website is one of the internet security problems that target the human vulnerabilities rather than software vulnerabilities. It can be described as the process of attracting online users to obtain their sensitive information such as usernames and passwords. Types of web pages are different in terms of their features. Hence, we use a web page features set to avoid phishing attacks. We proposed a model based on machine learning techniques to detect phishing web pages. We have suggested some rules to have efficient features. The model has 13 inputs and 1 output. The average classification accuracy was measured as .05%.


2019

Vol 4, No 3 (2019): Secured Mail System using Asymmetric Cryptography – RSA and ElGamal Algorithm

Authors:-Zarni Sann, May Thiri Win, San Thiri Aung 

Abstract:-Mail messages are secure communication that transfers from one computer to another computer. In this system, user sends mail message to another user and, this message is stored in server by SMTP protocol. ElGamal encryption and RSA algorithm is made before storing mails to mail server. ElGamal decryption and RSA decryption is made after retrieving mails from mail server. When user receives a mail, server retrieves this mail served by POP protocol. This system is implemented to secure mail server system for local government’s important mail messages. Implementation results of the system are secure patient records report for health department. Patient records must be secure for particular department. This system is based on locally own mail server mail client, and is implemented by using C# programming language and SQL Server to store mail messages.

 

Vol 4, No 3 (2019): A Review on Cloud Computing: Security Issues and Assaults

Authors:-P Dhivya S , Ajith Jerom B, Dr. S. Sarathambekai

Abstract:-Cloud computing provides an extensive servers in general. Massive information can be found using cloud.. It rather provides internet for light weighted devices which is portable in nature through IT architecture. In addition to that it increases the capacities and capabilities of both existing as well as new software. In general, the cloud computing environment contains the whole data part in a set of networked resources which enables the access of data’s through an emulator called as the virtual machine. The problems in cloud computing are listed based on the parameters such as storage space, bandwidth, and few environmental issues such as availability ,scalability, heterogeneity and some security problems like reliability and privacy. In this technique many efforts had put forth to improve the solutions for these problems but still there are some security issues. The data assurance is very importance in cloud storage due to security issues. The security in cloud computing can be described broadly through the set of technologies along with the policies and controls meant for the security and safety of applications which involves the data’s and its respective infrastructure. By virtue of incredible evolution in technology which provides the security for the customer data becomes progressively crucial. This paper will discuss about the various security objectives such as confidentiality, integrity, authentication, auditing, accountability, availability, authorization for cloud security standards.

Vol 4, No 3 (2019): Water Monitoring System Based on Internet of Things

Authors:-P. Akhila, Dr. R. Senthil Prabha

Abstract:-Water is always an important part of daily life. Water management and conservation is vital to human survival due to the global environmental situation. There have been huge needs of consumer-based humanitarian projects in recent times that could be rapidly developed using the technology of Internet of Things (IoT). In the proposed methodology a water monitoring system based on IoT that measures the level of water in real time. The prototype is based on the idea that water level, especially in disaster-prone areas, can be very important parameter when it comes to flood occurrences. To detect the desired parameter, a water level sensor is used, and if the water level reaches the parameter, the signal is fed to the cloud in real time. A cloud server has been configured as a repository for data. The water level measurement is shown in the remote dashboard.

Vol 4, No 3 (2019): Achieving Integrity Assurance of MapReduce in Cloud Computing

Authors:-Meenakshi, Ramachandra AC, Subhrajit Bhattacharya

Abstract:-We are living in Internet world. Information or data is required on demand wherever, whenever required. Large amount of data in different formats which cannot be processed with traditional tools like Data Base Management system is termed as Big Data. MapReduce of Hadoop is one of the computing tools for Big Data Analytics. Cloud provides MapReduce as- a-service. In this paper we investigate and discuss challenges and requirements of MapReduce integrity in cloud. Review of some of the important integrity assurance frameworks are also focused with their capabilities and their future research directions. We discussed on algorithms for detecting collusive and non-collusive workers.

Vol 4, No 3 (2019): Distributing Computing Security: Amazon Web Service

Authors:-RichaGautam, Rajkumar Sharma, Shashi Kant,SnehRachna

Abstract:-Distributing computing is an as of late developed model which is getting to be well known among practically all undertakings. It includes the idea of on interest administrations which means utilizing the cloud assets on request and we can scale the assets according to request. Cloud computing without a doubt gives unending benefits and is a financially savvy model. The major worry in this model is Security in cloud. This is the reason of numerous ventures of not leaning toward the cloud registering. This paper gives the audit of security inquire about in the field of cloud security. After security inquire about we have displayed the working of AWS (Amazon Web Service) cloud computing is the most confided in supplier of cloud computing which not just gives the astounding cloud security yet additionally gives fantastic cloud administrations. The fundamental point of this paper is to make distributed computing security as a center activity and not an extra activity.

Vol 4, No 2 (2019): Cloud Attack Implication and Openstack

Authors: Meenakshi, Ramachandra AC, Subhrajit Bhattacharya

Abstract: We brief about cloud computing attacks and counter measures. Also we explain how cloud security differs than On-Premise Security. Cloud attack implications, attack category have been depicted. Openstack role in addressing cloud attack is also been discussed.


51 - 75 of 116 Items     << < 1 2 3 4 5 > >>