Professional Documents
Culture Documents
the source to the destination The sender sending the content-leakage scenario can be described by the
packets of data of information. Every data from the following steps as depicted a regular user in a
source is sent via packets to reach the destination of secure network receives streaming content from a
the receiver The loss of packets will be checked and content server these with the use of a P-to-P
evaluated based on the sent data’s of packets[10][7] streaming software the regular yet small user
translations then the data is lost during packet different distributes the streaming content to a non
transfer then user there will be an intruder changing regular user outside its network[2]. Such content-
the content in the data packets Information has been loss is hardly detected or blocked by watermarking
loss and changed by the intruder or because of any methods and DRM models An overview of the
different reasons will be checked in the information network models of the proposed leakage detection
leakage check module In information loss check system This model consists of two main
module packets will be checked on the traversal of components namely the traffic pattern generation
source to destination of the indent users engine embedded in each router and the traffic
accordingly The packet Monitoring will be pattern matching engine implemented in the
emphasized with the checking up of the data loss management server then each router can observe its
during the packet transfer from the sender side to traffic volume and generate traffic pattern
the destinations side data exchange Real time Meanwhile the traffic patter matching engine
example of our project is “data streaming of Data computes the similarity between traffic patterns
The overall performance of our system will be through a matching model[9] and based on specific
checked and evaluated in the results evaluation criterion detects contents loss The result is then
module based on the original packet data transfer notified to the target edge router to block leaked
from the user to the receiver of the traffic network traffic[11]
model
| | | add a copy of the coded packet to the set of different Web applications and Web-based data
coded packets and set the coded packet Output: the base systems existing work in the data of Web
set of coded packets application security and mainly useful on the
mitigation of cross site scripting (XSS) and SQL
different attacks. In different cross site request
forgery (XSRF) [16]attacks is received much
attention In an XSRF attack the trust of a Web
application in its authorized users is exploited by
taking the attacker make arbitrary HTTP requests
different user The faults is that Web applications
different act upon such requests indifferent
checking and the performed actions are different
XSRF is a relatively new security faults is largely
different Web application deplored people As a
result these privies[18][21] many Web
applications are vulnerable to XSRF. Indifferently
2. Custom Rate Adaption Algorithm: existing mitigation approaches are time-consuming
The author developed a custom rate adaption and error-prone, as they require manual effort to
algorithm for both drivers. This rate adaption integrate new techniques into privies systems we
algorithm ensures a fixed modulation and coding present use these techniques that provides a
scheme regardless of loss patterns.[21] The completely automatic protection from XSRF
modulation and coding scheme can be manually attacks. Some different peoples our approach is
changed, but it will remain the same until it is based on a server-side web applications finding and
manually changed again. In the rest of this thesis, it prevents XSRF attacks in a way that is transparent
is referred to as the fixed rate adaption algorithm to users as well as to the Web application itself We
define experimental results that taken results we can
use our prototype to secure a number of popular
open-source Web applications different searching
information’s different models[24][12]
ATPG can also be used to monitor available data of different lengths The proposed method
bandwidth. For this experiment, we used Pathload allows flexible and accurate streaming content
[15], a bandwidth probing tool based on packet leakage detection independent of the length of the
pairs/packet trains. We repeated the previous streaming content which changed secured and
experiment, but decreased the two UDP flows to 10 trusted content delivery rate Artificial Intelligence
Mb/s, so that the bottleneck available bandwidth (AI) is one of the connections oriented research
was 10 Mb/s. Pathload reports that has an available areas which can be utilized to find new ways for
bandwidth5 of 11.715 Mb/s, has an available pattern generation Many technologies such as
bandwidth of 19.935 Mb/s, while the other (idle) Machine Learning and Neural Networks could be
terminals report 30.60 Mb/s. Using the same applied to finding faults new types of web attacks
argument as before, ATPG can conclude that link is We could employ these methods to develop more
the bottleneck link with around 10 Mb/s of available efficiently detection applications based on frame
bandwidth logs with long time taken the results.
V. Future Work
In addition to the web monitor for leakage detection
and analysis of the data streaming indifferent any
the register users to redistribute the data content in
order the trusted networks the watermarking models
along with the video data to embed the security of
the sender and the secret information to the register
users of the trusted network In addition There are
many applications of this research that can be
generated studied and explored. For example,
Artificial Intelligence (AI) is one of the connections
research areas which can be used to find new
models for pattern cassations Many technologies
such as Machine Learning and Neural Networks to
be applied to detect new types of web attacks. We
could user these technologies to develop different
user detection applications based on event logs with
long time observation then our framework further
analyzing inputs and outputs of a web application
Conclusion: system and thus discover and prevent new types of
The content leakage finding system based on the web attacks
real fact that every streaming content has single
References:
traffic pattern is different solution to prevent models
[1] Y. Chu, S.G. Rao, S. Seshan, and H. Zhang,
redistribution of contents by a regular small size of
“Enabling Conferencing Applications on the
user three typical found mental methods namely T-
Internet Using an Overlay Multicast Architecture,”
TRA P-TRAT and DP-TRA This paper attempts to
solve these issues by introducing a XSS models we [2] Z. Yang, H. Ma, and J. Zhang, “A Dynamic
investigate the performance of the proposed method Scalable Service Model for SIP-Based Video
under a real network environment locations with Conference,”
3392 International Journal of Research in Computer Science & Engineering www.ijrcse.com
ISSN: 2321-5585 (Online)
IJRCSE Vol-5, Issue-6, Nov -Dec, 2015 ISSN: 2321-0338(Print)
[24]. StripeFramework,http://stripes.sourceforge.net
/docs/current/javadoc /index.html
[25]. WEB4J Framework,
http://www.web4j.com/UserGuide.jsp#XSS