i-manager's Journal on Information Technology (JIT)


Volume 5 Issue 3 June - August 2016

Research Paper

Design and Analysis of Secure and Efficient Image with Embedded Sensitive Information Transferring Technique using Blowfish Algorithm

Kaki Leela Prasad* , Pilaka Anusha**, G. Jyothi***, K. Dileepkumar****
*-**** Department of Information Technology, Vignan's Institute of Information Technology, Visakhapatnam, India.
Prasad. K. L, Anusha. P , Jyothi. G and Dileepkumar. K (2016). Design and Analysis of Secure and Efficient Image with Embedded Sensitive Information Transferring Technique using Blowfish Algorithm. i-manager’s Journal on Information Technology, 5(3), 1-8. https://doi.org/10.26634/jit.5.3.8135

Abstract

The usage of internet is in all aspects like Railway Reservations, Air Ticketing etc. Drastically, there is a lack of security in real time operations. Hackers crack the passwords usually by using few attacks like shoulder surfing attacks, phishing attacks, online guessing attacks, and brute force attacks. To overcome these attacks there already exists image based passwords like captcha technologies pass points and cued recall in providing solutions up to certain range, but it reduces the efficiency by loading huge images while generating the passwords. To overcome this, the authors proposed a new secure and efficient image with Embedding Sensitive Information Transferring Technique using Blowfish Algorithm for Key Generation.

Research Paper

A Prevention Approach to Counter DDoS Attacks in Application Layer

A. Siva Kumar* , M.Ganesh Karthik**
* PG Scholar, Department of Computer Science and Engineering, Sree Vidyanikethan Engineering College, Tirupati, A.P, India.
** Assistant Professor, Department of Computer Science and Engineering, Sree Vidyanikethan Engineering College, Tirupati, A.P, India..
Kumar. A. S and Karthik. M. G (2016). A Prevention Approach to Counter DDOS Attacks in Application Layer. i-manager’s Journal on Information Technology, 5(3), 9-14. https://doi.org/10.26634/jit.5.3.8136

Abstract

Distributed Denial of Service (DDoS) attack includes by sending large volume of enormous requests to the server or site and it will unable to handle the enormous requests, and the server remains offline for some time depending upon the attack. Flooding attack is one type of the DDoS attack. For the detection of DDoS flooding attack, one of the approaches is used as multi-dimensional sketch design by integrating with Hellinger Distance (HD) analysis. The HD analysis can be used to monitor the network flows. Sketch technique can be used to detect the attack and it is having the capability of selectively discarding the offending messages only, but not the attack resource. Mainly this can be applied to the VOIP networks, but not to all type of attacks. To prevent DDoS attacks, one of the metrics used is the New Cracking Algorithm. This algorithm includes whenever the client enters into the particular web resource exceeding more than the given threshold, then the client's IP address can be added to the blocked list as an attacker, and the security can be applied by using Message Authentication Code (MAC) for the client's IP address. So this algorithm can protect the web resource even for large volumes of DDoS attack traffic.

Research Paper

Effective Bug Triage with Software Data Reduction Techniques Using Clustering Mechanism

This paper has been removed due to plagiarized work because of the dual submission by author.
Research Paper

Achieving High Accuracy in an Attack-Path Reconstruction in Marking on Demand Scheme

P. Banu Prakash* , E.S.Phalguna Krishna**
* PG Scholar, Department of Computer Science and Engineering, Sree Vidyanikethan Engineering College, Tirupati, India.
** Assistant Professor, Department of Computer Science and Engineering, Sree Vidyanikethan Engineering College, Tirupathi, India.
Prakash. P. B and Krishna. E. S. P (2016). Achieving High Accuracy in an Attack-Path Reconstruction in Marking on Demand Scheme. i-manager’s Journal on Information Technology, 5(3), 24-29. https://doi.org/10.26634/jit.5.3.8138

Abstract

A source of a Distributed Denial-of-Service (DDoS) attacks are one of the major threats to the Internet today. DDoS attacks can be recognized by the traffic they make using the IP traceback technique [5]. In general, there are only a limited number of routers and the computers involved in an attack session are noticed. Therefore, only marking those involved nodes for traceback purpose is needed, rather than marking each node of the Internet, as the existing schemes does. Based on this finding, a novel Marking on Demand (MOD) scheme based on the DDPM mechanism to dynamicaly distribute marking IDs in both temporal and space dimensions is available. The available MOD scheme can traceback to all probable sources of DDoS attacks, which is not feasible for the existing DDPM schemes. However, the existing MOD framework needs to be extended since it suffers from both false positive and false negative rate. This paper aims to extend the existing MOD scheme by using a 32-bit marking field in order to reduce the shortcomings and to avoid the problem caused by packet fragmentation due to increase in marking length.

Research Paper

Linear Regression Analysis and Validation Studies of Insulin-Like Growth Factor (IGF-1) Receptor Inhibitors

R. Rambabu* , P. Srinivasa Rao**
* Associate Professor and Head, Department of Computer Science & Engineering, Rajamahendri Institute of Engineering & Technology, Rajahmundry, India.
** Professor, Department of Computer Science & Systems Engineering, College of Engineering, Andhra University, Visakhapatnam, India.
Rambabu. R and Rao. P. S (2016). Linear Regression Analysis and Validation Studies of Insulin-Like Growth Factor (IGF-1) Receptor Inhibitors. i-manager’s Journal on Information Technology, 5(3), 30-43. https://doi.org/10.26634/jit.5.3.8139

Abstract

To delineate the dependency of physico-chemical properties on activity of inhibitors, a python program was written to study the linear regression analysis on a set of Insulin Growth Factor – 1R inhibitors. About 87 IGF-1 receptor inhibitors were selected from published literature with few independent variables such as Molecular weight, Hydrogen bond donors, acceptors, logP and a number of freely rotatable bonds, 5- and 6- membered aromatic rings, Randic, Balaban indices, LUMO, HOMO, Dipole, Lipole and molar refractivity were selected. The relationship between dependent variable (log1/IC ) and independent variables was established by linear regression analysis using python code. A linear regression 50 2 analysis resulted in F-test: 8.812, r value: 0.794 and r value of 0.631, respectively. Inter-correlation between variables of the proposed regression model was checked to know about their independence. It is observed that compounds 13, 53 and 63 has standardized residuals -2.011, 2.309 and 2.227 respectively and can safely be excluded from the data set. Leverages and standardized residuals resulted in similar outcomes, but leverage analysis was able to find three more outlying data, finally 6 compounds were omitted from the dataset of 87 compounds, and the remaining 81 were divided as 76 molecule training set and a 5 molecule validation set. The predicted values of test set data (actual vs predicted) 2 2 when Equation (2) was applied and the regression coefficient (r ) obtained was 0.9686 and regression coefficient (r ) o passing through origin was plotted, which is 0.9326 within the limits. Regression plot between actual vs. predicted values 2 2 of compounds and vice versa of test data set showed r = 0.9686 and r = 0.9465, which suggests the predictive ability of o 2 the regression equation. From the analysis of test set, the regression equation is said to have predictive ability with R = cv,ext 2 2 2 2 2 2 2 0.99, R = 0.97, (R – R ) / R = 0.03 and (R – R ) / R = 0.02 and k = 1.01 and k' = 0.99 respectively.

Review Paper

Analyse the Encryption and Decryption Conversion Time of Various Algorithms on Different Settings of Dataset

A. Usha* , A. Subramani**
* M.Phil Scholar, Department of Computer Science, Govt. Arts College, Dharmapuri, India.
** Assistant Professor, Department of Computer Science and Engineering, Govt. Arts College, Dharmapuri, India.
Usha. A and Subramani. A (2016). Analyze the Encryption and Decryption Conversion Time of Various Algorithms on Different Settings of Dataset. i-manager’s Journal on Information Technology, 5(3), 44-53. https://doi.org/10.26634/jit.5.3.8140

Abstract

Security is the most difficult angle in the system correspondence framework. In system correspondence framework, trade of information data for the most part happens on arranged PCs, remote telephone, and other web based electronic contraptions. Cryptography is the one of the primary PC securities that proselytes data from its ordinary structure into a disjointed structure by utilizing encryption and decoding strategies. The security of remote systems principle acknowledges and the procedure of encryption and decoding assumes as an imperative part to give security to the remote systems. Unsecured information goes through numerous kinds of result. The cryptography strategies used to just an approve individual can have the capacity to open and read the first message. Various cryptography methods are created to accomplish the security in the system correspondence framework. There are essentially two sorts of cryptography systems, viz. symmetric key and Asymmetric key. In Symmetric key systems, the same key is utilized to encryption and unscrambling information. An awry key procedure is utilized to illuminate the key circulation. In Asymmetric keys, are utilized in two keys particular open key and private key. In this, the Public key is utilized for encryption and the private key is utilized for decoding. This paper gives a contrast between the cryptography calculations on various settings of information parcels and utilizing the different calculations (DES, AES, Blowfish, RSA, RC6, RC4, and TRIPLEDES). In this paper relative investigation of the DES, AES, Blowfish, RSA, RC6, RC4 and TRIPLEDES calculations, for example, distinctive size of information squares, diverse key sizes, and encryption /decoding speed are done. Various symmetric and lopsided calculations are proposed in reason situation. Numerous favourable position and weakness are in calculation. This paper is a review of the better than ever Security based calculations in system security.