Sei sulla pagina 1di 4

International Journal of Trend in Scientific

Research and Development (IJTSRD)


International Open Access Journal
ISSN No: 2456 - 6470 | www.ijtsrd.com | Volume - 2 | Issue – 3

Survey on Identification of Hacker by Trapping Mechanism

C. Ramprasath J. Varun Ms S. SriHeera


UG Student, Department of UG Student, Department of Assistant Professor, Department of
Computer Science & Engineering, Computer Science & Engineering, Computer Science & Engineering,
Easwari Engineering College Easwari Engineering College Easwari Engineering College
Tamil Nadu, Chennai Tamil Nadu, Chennai Tamil Nadu, Chennai

ABSTRACT

Advanced persistence threat (APT) attack is to steal which may be positive, negative or neutral. It is also
data rather than to cause damage to the network or known as data mining, deriving the view or attitude of
organization. It is one of the initial phases in a speaker. Sentimental analysis is mainly based on
successful hacking of a system. Here, user’s machine learning where the system classify the
behaviour is analysed based on previous behaviour emotions and opinions of the humans based on the
such as posted data, time of posting, IP address and content, which may be a text or voice. The
location of usage of social network. This system sentimental analysis predicts the emotions based on
includes two processes. The Social network accounts the understanding of the opinions and content of the
are analysed, tracked and then detected. If the hacker social data given by the user. Sentimental analysis is
attacks the original user’s account, then the system enormously used because it gives an abstracted view
allows the attacker to proceed further until our system about the public opinions about certain topics or
captures all the important information about the emotions. Social media monitoring tools make that
attacker by directing the hacker to the fake website. process faster and easier than ever before. The ability
The system generates Honeywords based on the user or skill to get an understanding about the detailed
information provided and the original password is view of data used in social networks is widely used in
converted into another format and stored along with lot of enterprises. The changes that have been shown
the honeywords. Attacker who knows the E-mail in social media have been similar to that of the
account of original user can easily reset the password changes that have been shown in stock markets. The
of the cloud server. When the attacker tries to login human language is complex. It’s tedious to teach a
into the purchase portal, he/she is tracked and allowed machine to analyse the various grammatical shades,
to do purchase. Server identifies the attacker and cultural variations, slang and misspellings that occur
sends an alert message to the owner and blocks the in online mentions.
attacker from doing transaction from his original
account. Honeyword

Keywords: Cloud security; Hacker; Honeywords; Honeywords are sequence of characters that are
Sentimental Analysis; Social Networks generated by humans that look like a password.
Honeywords are proposed as part of honeypot, so that
Introduction any intruder attempting to log in with the password
may be assumed to be an attacker. Hackers these days
Sentimental Analysis: create automata that produce sequence of possible
passwords. Some hackers perform a weighted random
Sentimental analysis is the process mainly used to
walk against a PCFG grammar that was trained on
predict the emotions based on the content of the text,

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Page: 53


International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
real human generated passwords. In this approach, [3] The paper uses COMPA to detect malicious
first a probabilistic context free grammar, (PCFG), is messages before they were posted, avoiding the
trained on a set of passwords that you want the fake information to spread. Paper applies COMPA
honeywords to resemble. Next, the honeywords are to two datasets from popular social networks,
produced by performing a random walk along the Facebook and Twitter, and show that our system
grammar. The (P) in PCFG stands for "probability". would have been able to detect compromised
This means for each transform in the PCFG a random accounts. It also shows that COMPA would have
number is generated, and a transform is chosen based been able to detect four high profile negotiations
upon that random number and the weighted that affected popular Twitter accounts.
probability of a transform. For example, if the [4] There are mainly four factors related to user
grammar contains the transform S-> 'word' + '132' and authentication: authentication by something user
that transform has a probability of 90%, then on knows (e.g., password), authentication by
average around 90% of the generated honeywords something user has (e.g., physical token),
will end with '132'. authentication by something the user is (e.g.,
biometric authentication) and authentication by
Cloud Security someone user knows. Among these four factors of
authentication techniques, password-based
Cloud computing security is a service that includes
authentication is widely accepted for its simple
protecting critical information from theft, data leakage
login functionality and ease of memorability.
and deletion. One of the benefits of cloud services is
[5] This system speaks about the security intensity of
that you can operate at scale and remain secure. It
the user passwords. It uses techniques like
proposes how to manage security and different ways
Chaffing-by-tweaking, Chaffing with “toughnuts”,
of delivering security solutions that address new areas
Chaffing-with-a-password-model for the analysis
of concern. Cloud security does not change the
of the obtained passwords. Also, the security
approach on how to manage security from avoiding to
mechanisms like Denial of service attack, brute
detective and corrective actions. Client requests from
force attack. To enhance the previous system, a
the service provider server occurrence and enters most
login system with honeychecker is used.
settings and choose the operating system. Then clients
[6] The paper proposes a set of behavioural features
determine the size and other settings needed that
of online social networking users that can
allows them accessing the cloud and using the
characterize the activities of the users on social
applications they requested. After a period, if they
networking sites. The user’s behaviour is
needed more space, they enter the accounts in the
characterized into two classes introvertive and
cloud and increase time in seconds to get over a larger
extroversive behaviour. The user behaviour is
space area.
mainly analysed to detect the compromised
Literature Survey accounts based on the pattern of the content given
by the user.
[1] The paper proposes a mechanism called Advanced [7] The system uses a browser on the network through
Persistent threats [APT] along with Socialbots. which the foreground tourists can receive the user
The reconnaissance phase permits the attacker to registration, login, view merchandise information,
find an entry gateway into the association leading browse the site news, etc. with the user
to the next phases. The main objective is to gain registration module, the user login module, the
knowledge about the deployment process, news-browsing module and the product-browsing
creation, and management of the social honeypots, module. The login users can manage personal
as well as their efficiency and security information, purchase, view and modify
enhancements. individual orders, review products, initiate
[2] It uses Openstack in Cloud handling. OpenStack complaints etc. with the personal information n
consists of a set of open-source projects which management module, the purchasing module, the
provide a variety of services for an IaaS model. Its private order management module, the commodity
five main projects deliver basic functionalities that comments module, and the customer grievance
are required for a cloud infrastructure and mainly module.
produce secured enhancements in cloud [8] It focuses on spam detection using personal
characteristics rather than the reviews as reviews

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Page: 54


International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
shall not be trustworthy. This work uses and both constraints could change when
geographical location and the IP address of the intermingling with other agents.
device with which he/she is accessing different [10] The datasets are created using various
resources on Internet. In addition, a content techniques like data collection, labelling,
analysis method to attack non-reviews using spam transformation, and sharing. Supervised machine
dictionary is also proposed. learning algorithm is proposed to obtain the result
[9] The paper mainly proposes the strategies to from the result. But various issues arise in relation
control the eccentricity of the social networking to collection bias, imprecise and irreproducible
sites based on the behaviour of the context given labelling, incomprehensible origin of adjunct
by the driver nodes. It assumes a set of agents and datasets, imprecise portrayal of features extraction
a set of subjects to be specified. Each agent has a and data transformation, and finally, complete or
certain level of interest and skill on each subject partial unavailability of raw and final datasets
used to build statistical decision models.
Publication
S.No Title Author Name Algorithm
Journals/Date
Data Quality
2017 ACM Journal of
Challenges in Social Nour EI-Mawass Supervised
1. Data and Information
Spam Research and SaadAlaboodi Learning
Quality (JDIQ)

Simran Bajaj*, Information Technology


A Novel User-based
NiharikaGarg and and Quantitative Spam review detection rule,
2 Spam Review
Sandeep Kumar Management (ITQM2017) Non-review detection rule
Detection
Singh Elsevier Journal

Handling Journal of Cloud


Aryan
compromised Computing: Advances, Cloud
TaheriMonfared1*
3 components in an Systems and computing,OpenStack,Spam
and Martin Gilje
IaaS Applications, detection rule,Queue
Jaatun2
cloud installation Springer 2016
Towards Improving 6th International
Storage Cost and Conference on Advances hidden markov chain
NileshChakraborty∗,
4 Security Features of in Computing & model,modeling-syntax-
SamratMondal
Honeyword Based Communications, ICACC approach
Approaches 2016
Achieving Flatness:
Selecting the IEEE Transactions on
Generator
5 Honeywords Imran Erguler Dependable and Secure
Algorithm,Honeychecker
from Existing User Computing
Passwords
Abigail Paradise,
Creation and
AsafShabtai, Rami
Management of IEEE TRANSACTIONS
Puzis, Open
Social Network ON COMPUTATIONAL
6 AviadElyashar, Source INTelligence
Honeypots for SOCIAL SYSTEMS
Yuval Elovici, (OSINT) tools,HoneyGen
Detecting Targeted 2017
MehranRoshandel,
Cyber Attacks
and ChristophPeylo

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Page: 55


International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470

Controllability of
social networks Marco Cremonini
Computational Social Networks metrics and
7. and the strategic use and Francesca
Networks (2017)Springer Diffusion metrics.
of random Casamassima
information
Design and
Implementation of Management information
Guoyong Zhao and Springer-Verlag Berlin
8. the Online system, Model View
Zhiyu Zhou Heidelberg (2012)
Shopping Controller pattern
System
XinRuan, Zhenyu
Wu, Member, IEEE,
Profiling Online IEEE Transactions on
Haining Wang, Honeypot
Social Behaviors for Information Forensics and
9. Senior Member, accounts,Extroversive and
Compromised Security (Volume:
IEEE, and IntroversiveBehavior
Account Detection 11, Issue: 1, Jan. 2016)
SushilJajodia,
Fellow, IEEE

Conclusion and Future Enhancements


4. Francesca Casamassima and Marco Cremonini,
When it comes to data there must be more security “Controllability of social networks and the
and features so that the confidentiality of the strategic use of random information”,
information is preserved. In order to overcome the Computational Social Networks (2017 Springer)
user’s data, the security systems should be enhanced.
However, the attacker must be identified to stop 5. Guoyong Zhao and Zhiyu Zhou, “Design and
further cybercrime. The three parts that are provoked Implementation of the Online Shopping System”,
to attacks are hardware, software and data. Among Springer-Verlag Berlin Heidelberg (2012)
these data is the only part, which is more susceptible 6. Haining Wang, SushilJajodia, XinRuan and
to vulnerabilities. So in future, countermeasures must Zhenyu Wu, “Profiling Online Social Behaviors
be taken to protect data and a lot of importance must for Compromised Account Detection”, IEEE
be given to single vulnerabilities. Transactions on Information Forensics and
Security (2016)
REFERENCES 7. Imran Erguler, “Achieving Flatness: Selecting the
Honeywords from Existing User Passwords”,
1. Abigail Paradise, AsafShabtai, AviadElyashar, IEEE Transactions on Dependable and Secure
ChristophPeylo, MehranRoshandel, Rami Puzis Computing (2017)
and Yuval Elovici, “Creation and Management of 8. Niharika Garg, Sandeep Kumar Singh and Simran
Social Network Honeypots for Detecting Targeted Bajaj, “A Novel User-based Spam Review
Cyber Attacks”, IEEE Transactions on Detection”, Information Technology and
Computational Social Systems (2017) Quantitative Management (2017 ITQM)
2. Aryan TaheriMonfared and Martin GiljeJaatun, 9. Nilesh Chakraborty and Samrat Mondal,
“Handling Compromised Components in an IaaS “Towards Improving Storage Cost and Security
Cloud installation”, Journal of Cloud Computing Features of Honeyword Based Approaches”,6th
(2016 Springer) International Conference on Advances in
3. Christopher Kruegel, GianlucaStringhini, Computing & Communications, (2016 ICACC)
Giovanni Vigna and Manuel Egele ,“Towards 10. Nour EI-Mawass and SaadAlaboodi, “Data
Detecting Compromised Accounts on Social Quality Challenges in Social Spam Research”,
Networks”,IEEE Transactions on Dependable and (2017 ACM Journal of Data and Information
Secure Computing (2017) Quality (JDIQ))

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Page: 56

Potrebbero piacerti anche