Skip to main content

Abstract

With the advent of internet the world has become very small in the arena of communication. The information can be communicated from one place to another place through the internet very easily and with great speed. Before communicating with each other the user must be authenticated by the remote system to provide security to the information. The concept of username with password is an efficient method of maintaining shared secret information between a user and a remote system. The information that is communicated through the internet passes across an unsecured network. This gives security breaches to the information of the user authentication and is being hacked by the hacker. Even though the user credentials are encrypted into a cipher text, still with the constant monitoring, the hacker is able to guess and decrypt the user credentials. Here, we are presenting some novel methods to prevent the hacker in knowing the user credentials even though it passes through the unsecured networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Scarfone, K., Souppaya, M.: Guide to Enterprise Password Management (Draft). Recommendations of the National Institute of Standards and Technology, Special Publication 800-118, 38 pages (2007)

    Google Scholar 

  2. Elminaam, D.S.A., Kader, H.M.A., Hadhoud, M.M.: Performance Evaluation of Symmetric Encryption Algorithms. IJCSNS International Journal of Computer Science and Network Security 8(12), 280–286 (2008)

    Google Scholar 

  3. Identification and Authentication, NIST Computer Security Hand Book, http://www.sos.cs.ru.nl/applications/courses/security2008/nistiadraft.pdf

  4. Raj, A.K., Tewari, R.R., Upadhyay, S.K.: Different Types of Attacks on Integrated MANET- Internet Communication. International Journal of Computer Science and Security (IJCSS) 4(3), 265–274 (2010)

    Google Scholar 

  5. Network security types of attack passive attack active attack, http://www.computernetworkingnotes.com/ccna_certifications/types_of_attacks.htm

  6. Petlu, P.B.B., Pendlimarri, D., Anantapalli, N.L.K., Naga Srinivas, P.V., Muralidhara Rao, M.: Proceedings of the IC2IT, International Conference on Computing and Information Technology, held on 11-12, 2011 at King Mongkut’s University of Technology, North Bangkok, Bangkok, Thailand, pp: 116-121 (May 2011)

    Google Scholar 

  7. http://en.wikipedia.org/wiki/Password_cracking

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bhushan Petlu, P.B., Kumar Anantapalli, N.L., Pendlimarri, D., Muralidhara Rao, M. (2011). Novel Methodologies to Avert Hacker. In: Nagamalai, D., Renault, E., Dhanuskodi, M. (eds) Trends in Computer Science, Engineering and Information Technology. CCSEIT 2011. Communications in Computer and Information Science, vol 204. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24043-0_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-24043-0_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-24042-3

  • Online ISBN: 978-3-642-24043-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics