Advertisement

Secure and Practical Authentication Application to Evade Network Attacks

  • V. IndhumathiEmail author
  • R. Preethi
  • J. Raajashri
  • B. Monica Jenefer
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 35)

Abstract

This paper elucidates the different types of attacks such as IP attack, URL attack, DOS attack, phishing during a file transfer. The objective is to provide a single platform for file transfer that can identify and resolve pervasive attacks in networking. A web application is developed for this purpose. When a file is transferred from the sender to the receiver it is transported through a secure FTP channel. An attacker can easily manipulate the channel to retrieve the file. The sender generates a secret key during transfer which is shared with the receiver. Using DES encryption, the file is encrypted and decrypted at the sender and receiver side respectively. When it is transferred through a channel, the file is stored in the buffer area for quick access. The attacks are monitored and reported to the administrator if it occurs. An administrator monitors the channel during transfer so that any malicious act can be identified and resolved then and there. The file is not obtained by the receiver if an attack takes place. In case of an attack the IP address of the attacker is stored in a database and the file is destroyed by the administrator so that the attacker cannot retrieve it. If no attack occurs and the file is received by the receiver, and an acknowledgement is sent to the sender. On the receiver end, the IP address of the receiver provided by the sender is verified before it can be allowed to be decrypted by the receiver using the secret key shared. This way the file is completely secured and any attack that takes place can be detected and the source of attack can be determined. These schemes allow secure file transfer in any external environment of any type of files such as audio, video, document, etc. Thus, the data is given security, integrity and confidentiality and the network medium is made efficiently accessible.

.

Keywords

IP attack URL attack Phishing DOS DDOS DES first section 

References

  1. 1.
    Chattopadhyay, P., Wang, L., Tan, Y.P.: Scenario-based insider threat detection from cyber activities. IEEE Trans. Comput. Soc. Syst. 5(3), 660–675 (2018)CrossRefGoogle Scholar
  2. 2.
    He, T., Leung, K.K.: Network capability in localizing node failures via end-to-end path measurements. IEEE Trans. Netw. 25, 434–450 (2017)CrossRefGoogle Scholar
  3. 3.
    Tolia, N., Kaminsky, M., Andersen, D.G.: An architecture for internet data transfer. Carnegie Mellon University, Intel Research, PittsburgGoogle Scholar
  4. 4.
    Zheng, W., Liu, S., Liu, Z.: Security transmission of FTP data based on IPSec. In: International Joint Conference on networking (2009)Google Scholar
  5. 5.
    Sharma, S.: Detection and analysis of network & application layer attacks. In: 2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • V. Indhumathi
    • 1
    Email author
  • R. Preethi
    • 1
  • J. Raajashri
    • 1
  • B. Monica Jenefer
    • 1
  1. 1.Department of Computer Science and EngineeringMeenakshi Sundararajan Engineering CollegeChennaiIndia

Personalised recommendations