Character attachment have been studied thoroughly from the view of psychology and media researches. In game playing, the player-avatar relationship is a form of character attachment and affects a good game design as well as management... more
Character attachment have been studied thoroughly from the view of psychology and media researches. In game playing, the player-avatar relationship is a form of character attachment and affects a good game design as well as management systems such as character customizing and in game purchasing policy. In this paper, we investigate such player-avatar relationship on the theme of team-based FPS where in general the attachment is not expected to be high. However, from the online survey for Tom Clancy"s Rainbow 6 Siege mania groups, we find that there are different character attachment patterns with respect to the role of players in the teamattacker, defender, and supporter. It shows that attackers think avatar as an "object, but the defenders show more "avatar as others" than the attackers. The supporters show high responsibility for the avatar and their play style is most like "avatar as symbiote" manner.
In the present scenario ATM transaction are carried out with the help of ATM cards which have to be physically swiped at the ATM machine. The present cash withdrawal system involves swiping the ATM card at an ATM Machine and then input a... more
In the present scenario ATM transaction are carried out with the help of ATM cards which have to be physically swiped at the ATM machine. The present cash withdrawal system involves swiping the ATM card at an ATM Machine and then input a four digit pin into the terminal for verification. This method is susceptible to many types of attacks such as shoulder surfing, replay attack and ATM card skimming. In this paper, we are proposing a system in which a QR code is used as an alternative to the physical ATM card based authentication. This system can be incorporated in smartphones and other wearable device thereby eliminating the need for carrying ATM cards. QR codes are generated in the wearable device as well as the ATM machine to carry out User Authorization. An eight-digit long pin is generated to make the system more secure than present one. A background server is used to generate unique 8 digit pins for each transaction. This background server also manages transactions and links them to a user's bank account when a transaction is underway. This scheme protects the user from shoulder surfing or observation attacks, replay attacks and partial observation attacks.
Nowadays, with the rapid growth in technologies, which depend on computers systems and networks, threats are also increasing enormously. So, a huge number of approaches have been developed to protect systems and networks and to increase... more
Nowadays, with the rapid growth in technologies, which depend on computers systems and networks, threats are also increasing enormously. So, a huge number of approaches have been developed to protect systems and networks and to increase the security since it is an essential requirement in the majority of the applications. In this paper, a statistical Naïve Bayesian method is applied in an IDS system using different scenarios. The performance of the IDS is measured through experiments using NSL-KDD dataset.
The Communication systems are typical data systems, which can be undetermined by unauthorized users who have illegal access to the systems. Main Problem created in attacking to malicious node and group of network, whole traffic by system... more
The Communication systems are typical data systems, which can be undetermined by unauthorized users who have illegal access to the systems. Main Problem created in attacking to malicious node and group of network, whole traffic by system break, data loss, data affecting and data failure system. Overcome node Proposed scheme uses a role-based access control frame work, MANET concept working algorithm with combined cryptographic primitives. A cryptographic puzzle module and a SHA2 key-based module to protect traffic patterns transferred through the Mobile ad-hoc network. Source node sends the data packet through the wireless channel with these two combined cryptographic primitives. A node which wants to receive the traffic pattern must solve these two primitives. First it solves the cryptographic puzzles and then it solves the key-based scheme (symmetric encryption) then only it can access the data traffic pattern packet send over the Mobile ad-hoc network. This scheme is compatible with packet transmission and storage and it takes low power consumption. Our experiments have demonstrated that combines the cryptographic primitives for key based and Puzzle based techniques to provide better security, since it uses the double-guarded security so that it provides efficient and secured system for Mobile ad-hoc Network.
One of the main objectives of this research paper is to map the security landscape of cloud computing systems and services running on Critical Infrastructures. In fulfilling this aim, first the cloud architecture will be laid out to... more
One of the main objectives of this research paper is to map the security landscape of cloud computing systems and services running on Critical Infrastructures. In fulfilling this aim, first the cloud architecture will be laid out to better understand the cloud security threats in terms of Confidentiality, Integrity, and Availability (CIA). Next, the paper will represent different types of attackers targeting the cloud while offering a comparison of traditional cyber attackers and attackers on the cloud. In the second section, the relevance of the cloud for Critical Infrastructures will be covered as it is significantly important to understand their interaction. In doing this, CII Protection (CIIP) programs of different countries will be visited as well. The main strength of second section is the investigation of different types of attacks targeting the Cloud on CII. This investigation ultimately will lead to a discussion whether attacking methods targeting the cloud on CII could be exploited by different types of cloud attackers or not.
In this paper, we present an identity (ID) based protocol that secures AODV and TCP so that it can be used in dynamic and attack prone environments of mobile ad hoc networks. The proposed protocol protects AODV using Sequential Aggregate... more
In this paper, we present an identity (ID) based protocol that secures AODV and TCP so that it can be used in dynamic and attack prone environments of mobile ad hoc networks. The proposed protocol protects AODV using Sequential Aggregate Signatures (SAS) based on RSA. It also generates a session key for each pair of source-destination nodes of a MANET for securing the end-to-end transmitted data. Here each node has an ID which is evaluated from its public key and the messages that are sent are authenticated with a signature/ MAC. The proposed scheme does not allow a node to change its ID throughout the network lifetime. Thus it makes the network secure against attacks that target AODV and TCP in MANET. We present performance analysis to validate our claim.
Software Defined Networking (SDN) is a developing innovation that pulls in noteworthy consideration from both industry and the scholarly community as of late. By decoupling the control rationale from the shut and restrictive executions of... more
Software Defined Networking (SDN) is a developing innovation that pulls in noteworthy consideration from both industry and the scholarly community as of late. By decoupling the control rationale from the shut and restrictive executions of conventional system gadgets, it empowers analysts and specialists to outline new imaginative system capacities/conventions in a significantly more adaptable, intense, and simpler way. SDN gives new research chances to security, and it can incredibly affect organize security inquire about in a wide range of ways. In any case, till today, SDN has not been very much perceived by the security group yet. The new elements given by SDN can help improve organize security and data security prepare. By efficiently thinking the open doors acquainted by SDN with system security, new bits of knowledge for future research has been given in this essential region.