Publications and Patent

CROSS SITE SCRIPTING (XSS) ATTACK DETECTION USING INTRUSTION DETECTION SYSTEM

Publication Date:  Jan 11, 2018 at IEEE Explore

Publication Description:

Everyone is now relying on the Internet for our innumerable kind of work; this has increased the opportunity for attackers to corrupt data and make vulnerable. Nowadays diverse kind of attacks is being launched in Cyber Space among which Cross-Site Scripting (Web Application Attack) is amongst top attacks of all time. Proposed work, suggest an outline for a system that can detect Cross-Site Scripting (known as XSS) attack using Intrusion Detection system (IDS). This work focuses on the detection of XSS attack using intrusion detection system. Here attack signature is utilized to detect XSS attack. To test the usefulness and effectiveness of proposed work a proof of concept prototype has been implemented using SNORT IDS. It is observed that proposed system correctly detected XSS attack.


Keyword : Cyber Space, Intrusion Detection System, Web Application, Cross-Site Scripting

A Survey on Various Issues Big Data in Cloud Computing

Publication Date:  Sep 30, 2017 at International Journal of Computer Sciences and Engineering

Publication Description:

Big data is a key concept that cannot be overlooked in the IT world considering the prominent increase in data, and data related services, it is important to explore this field and look at ways to improve data service delivery especially in the cloud. (CC) on the other hand, helps in tackling the issue of storage and data service. This research focus on the two key concept big data and (CC) and some of the issues and challenges that are inherent in the deployment of cloud services and big data. The shows study that security challenges are among the most prominent issue in the cloud and big data services. The plumbing issue and some other issues such as the issue of the cost to run cloud services in handling big data were observed. Also the issues of service level agreement which gives an organization the assurance of enjoying all services rendered by the organization running the cloud services. After considering some of the issues associated with big data and (CC), some solution was suggested towards improving the two key concepts which will go a long way in increasing the adoption rate of (CC) by organizations. It is important for organizations to consider the nature of how their data will grow in the future before deploying any cloud service in their business.

A SURVEY ON WEB APPLICATION ATTACK DETECTION METHODS

Publication Date:  May 15, 2017 at International Journal of Advanced Research in Computer Science

Publication Description

In the current scenario where time is money, the internet due to its versatile nature and time-saving features has influenced every age group and made them dependent on it, which has increased the internet usage exponentially. Due to a vast number of users, the internet has become more vulnerable to threats and attacks. So in this paper, we will review various existing methods to detect web application attacks that are injected by the attacker

A Review : Comparative Study of Edge Detection Techniques

Publication Date:  May 15, 2017 at International Journal of Advanced Research in Computer Science

Publication Description

This article defines research about edge detection systems with their functions, pros, and cons. For this purpose we will compare existing edge detection procedures lying under the 3 categories a) 1st order derivative/gradient methods (Sobel, Prewitt's, Robert's operator) b) 2nd order derivatives / zero-crossing (Laplacian of Gaussian, the difference of gaussian) and c) optimal methods (canny operator). The comparison is finished on the foundation of side detected pictures with their PSNR (peak signal to noise ration) and MSE (mean square error) values for exclusive strategies.

A Review : An Optimized Technique For Image Segmentation

Publication Date:  May 1, 2017 at International Journal of Advanced Research in Computer Science

Publication Description

publication descriptionSegmenting an image is evaluated as prime steps in the processing of a representation. This partitioned a digitized image into different parts within categorize to evaluate them. It is also used to make distinction dissimilar objects in the representation. Various segmentation techniques for an image have been designed and use in practice by the researchers to make them smooth and easy to evaluate separately. In this paper a literature reviews of basic techniques for segmenting a picture from previous five years. Current researchers in each of segmentation technique are existing in this paper.