International Journal of Advanced Computer Research (IJACR) ISSN (P): 2249-7277 ISSN (O): 2277-7970 Vol - 3, Issue - 13, December 2013
  1. 1
    Google Scholar
  2. 4
    Impact Factor
Secure and Automated Communication in Client and Server Environment

Saket Gupta

Abstract

The unstoppable mass of the internet and the network- based applications has gratuitous to obese stability leaks. Soothe the confidential protocols, which are worn to quarter receive bulletin, are eternally targeted by diverse attacks. So there is the need of secure framework for content attack detection. Content attackers suit the position or the dawning encipher of strengthen a choose pages worn in their attacks to transcribe undulations to genuine websites. As a result the ability telecast and receiving in a handful of forms are battle-cry agreement safe. In this composition we heap up our charitable dissect in the administering of duty sniffing and absence to hooker the correct anchor check action and prevail upon on fake determining trick, thus wander the attack insightful necessity be sent in a counterirritant time eon majority. In this paper we will propose an efficient detection technique where the process of data preparation from server is automated which will reduce the time duration. In proposed approach, client must authorize first in the central database. After authorization, server request data from the client. When client request for data server prepares the data by applying the Data Encryption Standard (DES) algorithm as an encryption technique and split them using the partition algorithm as file splitter technique in order to reduce the time overhead. After this process server sends the data with relevant log file to the client and also maintains the log file itself. If any attacker attacks the data it will be notified to the server and the client because of the hidden numeric adder which will also to be sent with the file.

Keyword

Content attack detection, diverse attacks, secure framework, anchor check action, Encryption- Decryption technique (DES), file splitter technique and hidden numeric adder.

Cite this article

Refference