Keywords : cyber-attacks


NB2M – Mechanism for Magnifying Micro Level Bugs for Secure Software System

Anil Kumar D; Susanta Kumar Das

International Research Journal on Advanced Science Hub, 2021, Volume 3, Issue Special Issue ICIES-2021 4S, Pages 26-33
DOI: 10.47392/irjash.2021.106

People speak greatly about the electronic gadgets in the past, present and in future. Nobody spells that it is secure or insecure in terms of safety. More inventions are carrying into the society but in behind there are lot of pitfalls which could damage personal or organizations from upper level to ground level. It is very important to build secure systems to have safe usage of electronic gadgets. USA government is spending millions of dollars on secure data because in future their total dependency is on data. Technology is growing and the hackers (persons) who damage or steal our information and bank balances are similarly increase in parallel. Bug bounty hunting is the new technique that is enforced for finding the software security in the newly build software or year’s long existing software. New bug bounty methodology teaches us how to identify our software is secure or not and what the flaws or bugs in the software. NB2M mechanism gives the sources of cyber-attacks and study preserved producers for cyber-crimes. This process may be benefitted for organization as well as software professional who can gain lump sum dollars. It is better go for one to two years for bug bounty.   

Identification of DOS Attack by implementing SYN Flood Attack and considering CPU Load Analysis

Sona D Solanki; Asha D Solanki

International Research Journal on Advanced Science Hub, 2020, Volume 2, Issue 8, Pages 68-74
DOI: 10.47392/irjash.2020.96

The stupendous utilization of the web and its entrepreneurial inclination is growing the prevalence to enhance cyber threats occurrence. The absolute identification of virtual-harassment plays a critical role in safeguarding computer systems. Assessment of safety concerns when recognizing a convergence between internet-security and network equipment is vital. To construct a robust infrastructure, the requisite of a cyber-safety methodology is integral. For example, if efficacious cyber-threat takes place then it significantly enhances the power usage of the database and solely impacts its hardware elements. This article provides a glimpse into a DOS intrusion and its stronger links between CPU utilization and absorbed resources, which is one of the most critical admonitions and intimidate features of the machine. DOS threat loads the network with congestion by implementing perilous data that will disrupt the machine by incorporating an estimated excessive energy usage imbibed by a Processor. According to the elevated mechanism, the identification of the SYN flood intrusion is addressed, which is the utmost prevalent DOS attack. In this methodology, this prominent attack is identified by incorporating Wireshark tools. The surveilling and sorting online flood vulnerabilities like SYN by extending a precise intrusion detection model for the safeguarding of data as well as cybersecurity to make the structure sustainable is implemented