Abstract
With the advent of internet the world has become very small in the arena of communication. The information can be communicated from one place to another place through the internet very easily and with great speed. Before communicating with each other the user must be authenticated by the remote system to provide security to the information. The concept of username with password is an efficient method of maintaining shared secret information between a user and a remote system. The information that is communicated through the internet passes across an unsecured network. This gives security breaches to the information of the user authentication and is being hacked by the hacker. Even though the user credentials are encrypted into a cipher text, still with the constant monitoring, the hacker is able to guess and decrypt the user credentials. Here, we are presenting some novel methods to prevent the hacker in knowing the user credentials even though it passes through the unsecured networks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Scarfone, K., Souppaya, M.: Guide to Enterprise Password Management (Draft). Recommendations of the National Institute of Standards and Technology, Special Publication 800-118, 38 pages (2007)
Elminaam, D.S.A., Kader, H.M.A., Hadhoud, M.M.: Performance Evaluation of Symmetric Encryption Algorithms. IJCSNS International Journal of Computer Science and Network Security 8(12), 280–286 (2008)
Identification and Authentication, NIST Computer Security Hand Book, http://www.sos.cs.ru.nl/applications/courses/security2008/nistiadraft.pdf
Raj, A.K., Tewari, R.R., Upadhyay, S.K.: Different Types of Attacks on Integrated MANET- Internet Communication. International Journal of Computer Science and Security (IJCSS) 4(3), 265–274 (2010)
Network security types of attack passive attack active attack, http://www.computernetworkingnotes.com/ccna_certifications/types_of_attacks.htm
Petlu, P.B.B., Pendlimarri, D., Anantapalli, N.L.K., Naga Srinivas, P.V., Muralidhara Rao, M.: Proceedings of the IC2IT, International Conference on Computing and Information Technology, held on 11-12, 2011 at King Mongkut’s University of Technology, North Bangkok, Bangkok, Thailand, pp: 116-121 (May 2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bhushan Petlu, P.B., Kumar Anantapalli, N.L., Pendlimarri, D., Muralidhara Rao, M. (2011). Novel Methodologies to Avert Hacker. In: Nagamalai, D., Renault, E., Dhanuskodi, M. (eds) Trends in Computer Science, Engineering and Information Technology. CCSEIT 2011. Communications in Computer and Information Science, vol 204. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24043-0_12
Download citation
DOI: https://doi.org/10.1007/978-3-642-24043-0_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-24042-3
Online ISBN: 978-3-642-24043-0
eBook Packages: Computer ScienceComputer Science (R0)