07 - Chapter II
07 - Chapter II
07 - Chapter II
REVIEW OF LITERATURE
(include masses and infrastructure) and developing the system such that it
provides protection for privacy, integrity and availability of the system. Security
credit card fraud, identity theft, cyber stalking, IP spoofing and phishing. Security
management port and protocol filtering was done. With the usage of more of open
sources system and increase in knowledge of skilled attacker. Our system has
become more vulnerable for the cyber-attack. The classical security management
objective is fairly different than the objectives of the security management in the
next generation cyber environment. With outburst increase of internet usage new
technology and lack of knowledge to masses of cyber risks opens new window for
significant research work in different aspects of cyber security has been carried
dependent on technology, more and more people are connected with the cyber
world, which is now attracting more cyber criminal by which increase every day
more cyber criminals and their criminal task. These criminals can easily use
Internet to do such kind of conventional crime such as sex trafficking, illicit drug.
In addition, they also affect the cyber world which aids the crime which often use
technology to commit cyber crime such as credit card fraud, intellectual property
theft and cyber bullying. So cyber security management technique has become
very vital problem in our society. In such cyber world, conventional security
of user. Gunjan et al. (2013) have described that cybercrime is criminal activities
included with the cyber environment where ever a network is included and the
process achieve to control the issue of cyber-security [21]. Jamieson et al. (2012)
idea of hierarchical classes and clarified clear structure for crime management.
All these are characterized according to the present status of cyber laws and
introduced a solution for the minimization of the crime [48]. Solms et al. (2013)
have defined that Information security is the protection of information (of masses
different dangers and vulnerabilities [49]. Manuputty et al. (2013) have stated that
the internet has turned into worldwide phenomenon, various advantages and
drawbacks (crimes) which are being gotten and conferred through the web. To
adopt with its advantages and drawbacks, cyber security is expected to ensure
person to utilize internet securely [50]. Mesko et al. (2011) have described the
characterize a few rules on how to raise awareness, diminishing risk and thereby
system will be offered in two primary parts. The first one will incorporate the
indicating which Situation Awareness method will be utilized and which Situation
Awareness basic inquiries should about request made to enhance future decision
making in cyber-security [52]. Benenson et al. (2011) have organized around the
aggressors, clients and agents and their primary role is to exercise the shortfalls:
attack and avoidance for assailants, awareness and training for victims, evidence
Wang et al. (2017) have described a common application, in which they separate
into parts Internet-scale and local scale and at point methodically summarize the
design, security and protection, information quality control and they compare
typical solutions [54]. Barghuthi and Baker (2014) have described the talked about
the idea of ethics and reasons that prompted utilized data technology in a military
war, the impacts of utilizing cyber war on common people, the legality of the
cyber war and method of controlling the utilization of data technology that might
observations and quantitative data science to address three goals: first one is
utilizing data science strategies like hierarchical clustering analysis on the initiated
mechanism and last one is understanding how adversaries adapt amid the
interruptions by protectors [56]. Stabek et al. (2010) have described that by the
utilization of web, cyber crime is a danger to the field of economy [57]. Wu.et al.
(2013) have introduced a framework that is named FARE that reduces financial
Wagner et al. (2014) have explained a mechanism with the use of Fuzzy Sets
(FSs) for minimizing any loss of information in which we transmit interval based
about the distribution of the information has been discussed in [59]. Kumar et al.
(2013) have introduced a technique for identifying for Malware based on API call
sequences utilizing with content and data mining, a static analysis strategy is
discussed [60].
trusted computing based method and extensible design as discussed in [61]. Roslin
which hacker cannot crack the image [62]. A novel symmetric key encryption
strategy is introduced by Ali et al. (2016) that support a keyword field free
indicate the places of the keywords where the keywords could be in any arbitrary
manner [63]. Wei et al. (2017) have introduced a novel OTFEP (one-time file
utilizing ant colony optimization using roulette wheel selection algorithm [65].
ASCII value for the data security problem [66]. Uddin et al. (2014) have
have proposed a technique for network security in which they consider various
layers of security rather than supportive single layer [68]. Sasi and Sivanandam
(2015) have introduced an ant Colony Optimization Key Generation method for
secure data transfer that is based on the image encryption method is discussed in
wavelet for encoding an image along with the password [71]. An algorithm is
think about over existing is discussed [72]. Salim et al. have introduced a security
Standard [73]. Improved Elliptic Curve Cryptographic methods for security reason
is introduced by Regina et al. that discussed in [74]. Sharma et al. (2009) have
different classifier such as MLP, NB and Naive Bayes algorithms and is named as
RUSMRN for evaluating the correctness task with the unbalance datasets. This
customer’s behavior in payment through credit card [76]. Malini et al. (2017) have
introduced a technique that adapts KNN algorithm and outlier detection that
provide efficient solutions for the fraud detection problem. This method also
reduces the false alarm rate and increases the rate of the fraud detection [77].
Ghobadi et al. (2016) have introduced a model that is based on two different
approaches such as an Artificial Neural Network and meta cost procedure. The
first approach is used prevention and detection for credit card fraud and the
second approach is used for decrease risk reputation and risk of loss [78].
Bahnsem et al. (2015) have designed method that is based on the periodic
feature for real credit card fraud record that is provided by the European card
method for credit card fraud detection that is based on modification of existing
approaches that reduce the following issues such as scalability, time constraints
transactions. Iris pattern is special type of pattern for all individual and it is most
secure biometric strategy that is performed by the utilizing image handling [81].
Murdoch et al. (2010) have introduced an EMV method that provides facility to
secure credit and debit card transaction confirmed by both card and customer that
and clustering technique [83]. Lee et al. (2013) have introduced a method for
assistance of a web based updating is described in [84]. Gupta and Sharma (2011)
have introduced multiple encryption method which has been created for safe
mechanism to enhancing the safety of the SET protocol with a bring-in electronic
immune computing, crossover and mutation operators and fuzzy framework that
Ingole and Thool (2013) have suggested a Hidden Markov Model (HMM)
mechanism that is in sequence to the operation in the get ready of credit card
card transaction to approve the exchange with high probability. In the event that it
is not at that point card is not valid and thought to be fake transaction [88].
managed with real social connections, discovers spikes in replicating and lastly
assigns fishy scores that help to recognize the fraud in the framework [89].
Tripathi and Ragha (2013) have proposed a hybrid procedure based model to
distinguish credit card fraud is discussed in [90]. Falaki et al. (2012) have
explained model that is based probabilistic approach for identifying the credit card
system [91]. Prakash and Chandrasekar (2013) have introduced a model for
improving credit card fraud detection that is based on optimization technique [92].
Kumar and Raj (2012) have introduced a HMM based model by incorporating
different fields for example, client profile and only spending profile. Also,
simulation comes about which demonstrate the change in True Positive and True
Negative rates and also diminishes the chances of both false negative and positive
[93]. Duman and Ozcelik (2011) have defined a novel mix of the two well
known meta heuristic methodology into the particular genetic algorithm and the
Scatter search which can be connected together to enhance security of credit card
[94].
Communal Analysis Suspicion Scoring (CASS) and is used for making numeric
suspicion scores for the streaming in the objective of credit card fraud detection
technique which incorporates the two most prominent RSA technique and Diffie
Hellman technique to fulfill greater security structure over the framework [96].
Nagar et al. (2012) have introduced a novel offline RSA key generation
Dhakar et al. (2012) have introduced a RSA technique with some modification
that utilize extensive prime number since cracking the extensive prime number is
a very challenging task that provide higher security and execution [98]. Wang et
al. (2013) have introduced a technique utilizing RSA algorithm [99]. Saveri et al.
(2012) have described the demonstration of the comparison between ECC and
RSA algorithm in the smart card application has been discussed in [100].
Authenticated New Multiparty Key Agreement Protocol for card detection [101].
Dubey et al. (2011) have explained a novel strategy for resource authentication
using RSA and MD5 algorithm [102]. Sharma et al. (2011) have introduced a
RSA algorithm with some alteration and utilizing with some alteration of the
knapsack is discussed in [103]. Ren et al. (2010) have introduced an algorithm for
employed with four prime numbers is portrayed in [105]. Ishwarya et al. (2012)
have introduced a novel method by utilizing with RSA for Anonymous and
tackle a security related issues in [107]. Ashioba and Yoro (2014) have
and they enable sender and recipient utilizing object oriented programming
language in RSA algorithm [108]. Kapoor et al. (2013) have introduced a method
that uses more than two prime number prime number and numerous key [109].
Kaur et al. (2016) have proposed a method malware detection of clone that
is based on the clone detection method utilizing with “String Pattern Back
Mazurek et al. (2013) have expressed strategy of data collection, especially the
how to guess number of password while regarding in offline attack [111]. Kelley
et al. (2012) have proposed an effective distributed approach that expressed the
online study for evaluating how effective numerous heuristic password guessing
technique to crack the password [112]. Dyer et al. (2017) have introduced an
[114]. Mordinyi et al. (2015) have illustrated a strategy that considers the issues of
mechatronic view on the designing artifact [115]. Yu et al. (2008) have defined an
architecture that expresse multi-tiered SOA includes Mobile client, Web services,
Security Agents, business logic layer, data access layer and database for security
in data transfer. This architecture also provides facility for safe data transfer such
as user identification information between server server and mobile client utilizing
with SAML [116]. Rybnicek et al. (2013) have described an agenda for
identifying the threat in facebook, these threats are depicted by different procedure
such as image analysis, social media analytics, and text mining techniques with a
motive to bring the problem of ongoing cyberattacks [117]. Apostal et al. (2012)
have designed an HPI architecture defined with three dictionary based password
technique that utilizes MPI for diminish the latency, provide facility between the
Text Passwords (PTP) methodology and also define comparison with few other
leakage [121]. Sriramya et al. (2015) have introduced an algorithm that contains
salt hash technique combine with Bcrypt algorithm for enhancing a security level
in Shopping [122]. Chen et al. (2009) have developed a bind decoding technique
purchasing that does not contain transformability of RSA digital signature [123].
provenance validation and reorganized at the base station [124]. Halderman et al.
cryptographic hash functions for arbitrarily numerous record and user needs to
memorize a small password for recalling. This method fully operates on client
side and no changes are requiring in client side [125]. A method is designed by
Khayal et al. (2009) that operates with password hashing techniques for
generating a secure password [126]. Islam et al. (2008) have described a method
that enhance a level of security via AES methodology and demonstrate the
key derivation function scrypt is defined by Percival et al. (2012) in which the
function obtains more than one secret key from secret string. This method
provides more security against attack with custom hardware depends on memory
authentication code, etc. for enhancing the level of security [129]. Malathi et al.
(2011) have suggested a mechanism with some alteration of two different types of
website which consist two different algorithms likewise Fuzzy logic and Data
approach for safe operation of a web environment, for easy application with
minimum impact to the present Internet banking structure [132]. Isohara and
Gao et al. (2013) to replicate virus propagation via two different technologies such
different technologies first one is fast application level emulator and the second
one is a flow algorithm that is based on graph matching [135]. McRae and
such as WEB bugs and honey token with a specific goal to find a phisher to the IP
identifying a phishing web page that uses Earth mover's distance (EMD) [137].
Mobile based anti-phishing method has introduced by Memon et al. (2013) that
creating three types of indications is known as vibration, flashing and text alert
based warning [138]. Smart device is introduced by Han et al. (2007) for phishing
detection which pre-collect login user interface information [139]. Sharfi and
provide facility for identifying and protection from real time phishing attacks
which uses two different methods likewise two way authentication and zero-
Afroz et al. (2009) is named as PhishZoo that uses fuzzy hashing techniques for
et al. (2010) provide protection from phishing with high probability that contains
recognition for changing the image into a text and after that use page ranking
al. (2016) have introduced a new mobile platform based anti phishing technique is
known as MobiFish that verify the validation of an application of web page and
show the comparison with an actual identity with the claimed identity
[144]. Cooley et al. (2014) have introduced an approach that expresses security
vulnerability in the context of the android platform [145]. Buber et al. (2017) have
introduced a model that uses Natural Language Processing are the part of data
mining technique, the objective of this model analysis the URLs in phishing attack
[146]. Shirazi et al. (2017) have proposed architecture for phishing website,
named “Fresh Phish”. This architecture does not consider only part of accuracy, it
also how long it takes to prepare architecture [147]. Futai et al. (2016) have
proposed a phishing detecting approach that is based on Graph Mining with Belief
Propagation [148].