INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND MATHEMATICAL THEORY (IJCSMT )

E-ISSN 2545-5699
P-ISSN 2695-1924
VOL. 9 NO. 3 2023


Cyber Attack Mitigation: Detecting Malicious Activities in Network Traffic

Amanze B.C Ph.D, Nlemadim Maureen Ihuoma


Abstract


The aim of this work is to detect malicious activities in network traffic. With the growth in data sharing through network, enterprise networks have become targets of attacks from Internet malware including node forgery or impersonation, worms, client-side infects (drive-by downloads) and phishing attacks. Malicious code and viruses can slip into the network and gain access to the computer systems connected to the network causing various sorts of issues. So this research work develops approaches to rapidly detect malicious network traffic including packets sent by port scanners and network worms. This was achieved by developing a system that will improve the cyber security for the e- platform. A system that monitors network user’s activities and keeps track of events and user’s activities history on the network was developed. The new system was built with robust security authentication using a hybrid technique (Digital Signature and Rivest-Shamir-Adleman (RSA) Algorithm) for securing the e- platform. The implementation of the hybrid technique on the e- platform was done using Php-MySQL and Java Script. Object- oriented analysis and design methodology was adopted in this work and it is a set of standards for system analysis and application design. The result from the new system was of immense benefit to network users as the system introduced a more secured communication channels for e- platforms thereby preventing loss of data. Also the cyber security system ensures that all critical data are encrypted and that only authorized users have access to data in its entirety.


keywords:

Digital signature, Encryption, Decryption


References:


Abrazhevich, D. (2014). Electronic payment systems: A user-centered perspective and
interaction design. Eindhoven: TechnischeUniversiteit Eindhoven.

Alshanketi, F., Traore, I., &Awad, A. (2018). Multimodal mobile Keystroke dynamics
biometrics combining fixed and variable passwords. WILE

Aishani, B. and Prabu, S. (2019) ATM PIN Authentication using Facial Recognition. School of
Computer Science and Engineering Vellore Institute of Technology, Vellore, Tamil Nadu

Amurth, P. K. and Redddy, M. S. (2012). Implementation of ATM Security by Using Fingerprint
Recognition and GSM. International Journal of Electronics Communication and...


DOWNLOAD PDF

Back