The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud provides convenient and on demand network access for computing resources available over internet. Individuals and organizations can access the software and hardware such as network, storage, server and applications which are located remotely easily with the help of Cloud Service. The tasks/jobs submitted to this cloud environment needs to be executed on time using the resources available so...
Due to increase in crime like abduction, persistent attacks, etc., the personal security and safety of passengers is becoming more and more important to the family, organizations and government. This has been noticed that maximum abductions are occurring at the bus stops where the passengers are waiting for their respective vehicles. The mismatch in the schedule of the vehicles and the passengers...
Mobile ad Hoc Network consists of a group of mobile nodes which can communicate with each other without any infrastructure. This feature makes them self organized and rapidly deployable. Clustering is a technique used in these networks for best utilization of available bandwidth and for prolonging the network life time also. The entire group of nodes participate in election of the Cluster Head which...
Big data is defined as large amount of data which requires new technologies and architectures so that it becomes possible to extract value from it by capturing and analysis process. Due to such large size of data it becomes very difficult to perform effective analysis using the existing traditional techniques. Big data due to its various properties like volume, velocity, variety, variability, value...
Wireless Sensor Networks (WSNs) are prone to various attacks in which Blackhole a kind of Denial of Service (DoS) attack is very difficult to detect and defend. In blackhole attack, an intruder captures and re-programs a set of nodes in the network to block the packets they receive instead of forwarding them towards the base station. As a result any information that enters the blackhole region is...
All Denial of Service Attacks (DoS) is malignant. Their occurrence in the network affects the entire network performance. Dropping attack either Packet Dropping or Datagram Dropping is DoS in nature. Both these attacks occur corresponding to Transport layer of Mobile Ad hoc Network (MANET) stack which affects the entire functionality of transport layer. In this paper we have discussed a novel kind...
MANETs have some special characteristics such as open network architecture, shared wireless medium and highly dynamic topology which make them much prone to different attacks. Denial of service (DoS) attack, the most common of all, if occurs becomes difficult to detect and defend. One of such attacks is JellyFish attack which is further categorized as JF Reorder Attack, JF Periodic Dropping Attack...
Hacktivism is the biggest challenge being faced by the Cyber world. Many digital forensic tools are being developed to deal with this challenge but at the same pace hackers are developing the counter techniques. This paper includes the digital forensics basics along with the recent trends of hacktivism in social networking sites, cloud computing, websites and phishing. The various tools of forensics...
Wireless Sensor Network consists of large number of sensor nodes with limited battery power, which are randomly deployed over certain area for several applications. Wireless Sensor Network (WSN) has a great potential to be deployed in wide range of applications like consumer, industrial and defense sectors. WSN s are susceptible to various attacks, in which Blackhole a kind of Denial of Service (DoS)...
Wireless Sensor Network (WSN) has a great potential to be deployed in wide range of applications like consumer, industrial and defense sectors. WSNs are susceptible to various attacks, in which misdirection a kind of Denial of Service (DoS) attack is very difficult to detect and defend. In misdirection attack, the intruder misdirects the incoming packets to a node other than the intended node. Due...
Cyber world is susceptible to various attacks, out of which malware attack is the malignant one. It is very difficult to detect and defend. A keylogger spyware contains both scripts keylogger and spyware in a single program. The functionality of this program is that it can capture all key strokes which are pressed by a system user and stores them in a log file, the spyware email this log file to the...
Access control technologies are being used today in various organizations for assuring the secure and authorized access to the sensitive data or resources. Many technologies have emerged from the past like Discretionary Access Control (DAC) and Mandatory Access Control (MAC). But these technologies had restrictions associated with them to be used for all organizations in commercial arena. The Role...
Denial of service (DoS) is malignant attack in MANET which is difficult to detect and defend. Jellyfish is a new DoS attack which is categorized as JF Reorder Attack, JF Periodic Dropping Attack, JF Delay Variance Attack. Out of these three, JF Reorder is the most effective one. It disrupts the whole functionality of TCP and further produces zero goodput. So its detection and prevention becomes very...
In this paper we have discussed about the need of effective information management, Storage area network (SAN). SAN is the hottest buzz word in the computer storage business today. It seems like every company with a storage product, from the smallest garage shop to the largest multi-billion dollar corporation, has a SAN strategy, along with all of the products that today's business owners and IT managers...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.