Preventing Phishing Attacks with Virtual Browser Extension -- Swapan Purkait
The scale of phishing problems has necessitated a response to help protect vulnerable users. As a consequence, anti-phishing and wider identity protection features are a commonplace within both web browsers and Internet security suites. A huge number of phishing defences are available. These solutions range from quick fix changes to more substantial redesigns. With all these counter measures readily available, researchers have found that many users cannot distinguish a legitimate website from a spoofed website; they have also found that browser security indicators are misunderstood or ignored frequently, and many users have never even noticed them. In this study, we propose Virtual Browser Extension (VBEx), a web browser plugin, which works on binary principle of legitimate or phishing and provides a trusted path between browser and the legitimate website. Unlike others, it does not provide any user interface to accept any wrong certificate or allow user to bypass the tool. It allows only a legitimate site to open and prevents all others from loading on the web browser. Our new solution checks for the authoritative name server and verifies the same for a visiting website. It also maintains a white list of websites so that when a user requires to access any of these, the default protocol should always be HTTPS, failing which it will prevent the web browser from loading the requested website. We conducted a series of laboratory tests on the VBEx prototype and found that the VBEx is a promising approach. © 2013 IUP. All Rights Reserved.
Worm Attack Detection in Network-Based System
--Ogwueleka Francisca Nonyelum
Organizations, business enterprise, government agencies and institutions depend on computer network to carry out routine activities because computer network provides a flexible, convenient and cost-effective way of storing, sharing, retrieving and transferring information. As these routine activities are carried out on the network, one great threat to these information assets is that of computer worm attacks. Traditionally, detection method involves the use of firewall, but despite that, computer worms still finds a way to evade them because of several weaknesses that exist in firewalls. In this research, the detection method considered is the use of Intrusion Detection System (IDS) behind routers and firewalls. This paper proposes an IDS that incorporates the signature-based and anomaly-based detection scheme that functions as an independent IDS to form a hybrid signature-based-anomaly-based detection system. The hybrid system improved the effectiveness and reliability of computer worm detection by a very great extent and thus it should be used at strategic locations on the network to provide a distributed solution with a defence-in-depth network security architecture. © 2013 IUP. All Rights Reserved.
Algorithm for Performance Improvement of DRTS
Under Static Load Sharing Scheme
--Urmani Kaushal, Avanish Kumar and Narendra Kumar
The performance of parallel applications is fundamentally dependent on the agreement of the task execution on processors available in Distributed Real Time System (DRTS). For such type of large and multifaceted real-time parallel applications, DRTS is one of the best platforms for execution. The parallel application is divided into multiple tasks which is to be executed over the nodes available in DRTS. These tasks have to be processed in relatively short periods of time, or the computation in real-time fashion is required. Using efficient load sharing and clustering policy can improve the performance of the system. The task allocation algorithm, which is NP-hard in complexity, must minimize the inter-task communication which can be achieved by clustering, and on the other hand, the clusters must be allocated on the appropriate node in DRTS. The algorithm proposed in this paper has used static load sharing policy and an effective clustering mechanism. The proposed algorithm was illustrated using a practical example and simulated in MATLAB 7.11.0. © 2013 IUP. All Rights Reserved.
Social Web: A Snapshot of Issues in the New Dimension
of FIRO-B
--Ramana Rao M V, Yuva Raju Macha, P Usha Gayatri,
Chandra Sekharaiah K, K S Niraja and T Arundhathi
The paper gives a snapshot of the kind of issues that mold the making up of the social media on the web. Five issues are brought out based on the literature survey. One, young people are very conscious and strategic in their visual self-presentation on Social Networking Sites (SNSs) with regard to building their profiles. The ‘ideal self’ or the ‘ought self’ guides the SNS users to present and make up their profiles in SNSs by photo selection for visual impression management. Two, singles present more photos of themselves and display higher numbers of friends, more group memberships and more wall postings on their SNS online profiles than persons who are in a relationship. Popular serves as an indicator of social attraction. Three, privacy concerns of the SNS users are increasingly becoming sensitive as a majority of users change the default privacy settings into more restrictive settings. Four, average Internet usage time is rapidly increasing, the starting age of Internet user is steadily decreasing. Parents, psychologists, educators, technology creators and lawmakers must become aware of the potential risks and rewards of this phenomenon. Five, cyberbullying is another undesirable phenomenon in SNSs. There could be many other issues. But for a basic study of the trends with reference to social networking websites, we have considered a snapshot of five issues only within the framework and scope of our study of the existing literature. Fundamental Interpersonal Relations Orientation Behavior (FIRO-B) value computation with reference to web-based interpersonal relations is found as an open area having potential for researchers. We conclude that existing literature failed to come up with revised FIRO-B scale in the context of SNSs. Hence, our future research work will be in this direction. © 2013 IUP. All Rights Reserved.
Digital Innovation in Design Practices: Technologies,
Opportunities and Challenges
--Runddy D Ramilo
Architectural practices are currently facing technological advancement with consequential technological and organizational challenges. They are embracing new modes of information sharing, adopting new technology and new digital processes such as Building Information Modeling (BIM), parametric design, digital collaboration, building performance simulation and other related technologies. With this recurrence, collaboration in research and architecture practices is increasing through which digital technology, building technology and computer science are collaborated. However, issues relating to the process management, specifically on the organization aspects are less examined and often taken for granted. Organization is a key essential element in digital innovation processes, but a majority of architects do not pay much attention to it. The success of digital innovation does not depend only on the knowledge of new digital technology, but it is also influenced by the knowledge of implementation processes. To unearth this problem, the paper investigates the factors that impede the effective adoption of emerging digital technologies for the efficient delivery of design projects that are computationally and digitally driven. This involves evaluating technical, financial and organizational barriers when digital innovation is implemented. In order to gain insights into these issues, a research was conducted based on literature and the relevant attributes and pattern of variables were found. They are grouped into three categories and can be used in establishing a framework for digital innovation. © 2013 IUP. All Rights Reserved.
|