scholarly journals Multiple-Feature Extracting Modules Based Leak Mining System Design

2013 ◽  
Vol 2013 ◽  
pp. 1-11 ◽  
Author(s):  
Ying-Chiang Cho ◽  
Jen-Yi Pan

Over the years, human dependence on the Internet has increased dramatically. A large amount of information is placed on the Internet and retrieved from it daily, which makes web security in terms of online information a major concern. In recent years, the most problematic issues in web security have been e-mail address leakage and SQL injection attacks. There are many possible causes of information leakage, such as inadequate precautions during the programming process, which lead to the leakage of e-mail addresses entered online or insufficient protection of database information, a loophole that enables malicious users to steal online content. In this paper, we implement a crawler mining system that is equipped with SQL injection vulnerability detection, by means of an algorithm developed for the web crawler. In addition, we analyze portal sites of the governments of various countries or regions in order to investigate the information leaking status of each site. Subsequently, we analyze the database structure and content of each site, using the data collected. Thus, we make use of practical verification in order to focus on information security and privacy through black-box testing.

Author(s):  
Edwin I. Achugbue

The chapter focuses on the history of the internet system of e-mail; e-mail security; threat to e-mail security, usefulness of e-mail address and country codes, how e-mails can be secured by the individual and electronic mail policy. The future of e-mail security is also described.


Author(s):  
Stephanie Austria

 Spoofing is one of the newest forms of cyber-attack, a technological methodology adapted to mask the identity of spammers who have faced hostile reaction in response to bulk, unsolicited, electronic mail messages.[1] Sending Spam, however, is no longer the only reason for deception, as crackers have taken pleasure in the challenge of manipulating computer systems and, additionally, find recreational enjoyment in doing so. In this legal Note, the author’s intent is to show that criminal, rather than civil liability is the best way to effectively deter and punish the spoofer. The injury that results when a computer system’s technological safety measures fail to adequately safeguard the system affects not only the owner of the hijacked e-mail address, but also the Internet Service Provider, and the Network as a whole. Current Anti-Spam Legislation is arguably ineffective at targeting these particular types of malicious attacks, and a different legal approach is suggested.


2020 ◽  
Vol 31 (3) ◽  
pp. 101
Author(s):  
Abbas A. Abdulhameed ◽  
Razi J. Al-Azawi ◽  
Basil M. Al-Mahdawi

The utilize of the web has made humans and companies powerless to exterior assaults. Indeed, cyber problems essentially influence information frameworks with distinctive types of malicious attacks such as spyware, virus, social engineering, etc. The Internet e-mail service, in particular, has become one of the most dependable methods of communication among people, institutions, and companies. The development of digital signatures to e-mail services has raised the e-mail security, which led to replacing the standard mailing of registered letters. Unfortunately, the process of sending and receiving e-mails has created a negative impact means on security and privacy from cybercriminals by diffusing spam and malware. As a result, e-mail hosts are constantly under attack by malicious programs that are often attached to e-mails. In this paper, the simulation model and prototype of an email traffic monitor developed and tested in order to prove the ability of our proposed method for detecting new viruses. This paper states the success possibility of this new method based on the simulation results. The results of the analysis suggest that the Cyber Security Modeling Language (CySeMoL) model has a good performance of operating system vulnerability prediction. At last, some useful suggestions in the context of the CySeMoL model are presented.


Author(s):  
Ali Hameed Yassir

Today an E-mail service is one principal tool in our daily work and life. We cannot dispense Email services. Spammers continue to develop their techniques to flood our inbox daily. On the other hand, websites are created to be in different types of different goals like news, sports, environments, staticialists, governments, etc. Websites may be in its environments, static sites, programs, or databases, and very often a combination of the three integrating relational databases as a back-end. Websites require intensive care in configuration and programming to assure a security factor, confidentiality, and trustworthiness of the published information. Most websites have many scripts that give visitors elastic options to share some subject's links URL with their friends one of that by using a tell a friend form. One of most well-known attacks over the internet is done by SQL-injection, though SQL-injections back to exploits, weak validation of textual input that is used to build tell friend scripts which cause dangerous attacks threat email user's privacy through cheating attacks. In this paper, the author aims to analyse a tell friend exploit and proposes a solution to stop this exploit. Category: Information Security.  


Author(s):  
Jerry Pournelle

If you’ve used e-mail for any time at all, you’ve no doubt had your inbox deluged with messages pitching aphrodisiacs, mortgages, junk stocks, pornography, and substances that claim to help you lose weight in your sleep. But don’t despair. Such messages don’t have to be part of the Internet experience. You can avoid them, or certainly reduce the annoyance level, with a few simple measures. Some spammers harvest e-mail addresses from the Internet by using a “spider” (also known as a robot or crawler)—a computer program that creeps through the World Wide Web collecting information you’d prefer to keep private. So the better you are at hiding your address from faceless prowlers, the less spam you will receive. 1. If your Internet Service Provider gives you the choice, create a long, fairly complicated address preceding the @; don’t just use your first name: [email protected] is better than [email protected]. Better still is donquixotedelamancha@example. com. It may be unwieldy, but your friends can always use a nickname—or just click on your address. Happily, longer addresses confuse spammers, who—without having exact user accounts in hand—use a “dictionary attack” to find them, testing the validity of every possible address from lists of common words and names: [email protected], [email protected], and so forth. 2. Again, unless some online service makes it mandatory, don’t use your e-mail address as part of a login name or identity. However convenient that might make it when logging in to eBay, it’s equally convenient for spammers. 3. Use a second, public address for nonpersonal mail and for public posting. Create a free account with Hotmail, Yahoo, or Excite, or set up another screen name if you use either AOL or another Internet Service Provider that allows you to have multiple addresses. This keeps your main address private and exposes only your public address to spammers. Check the public account at least occasionally, in case something innocent has come in. Then massively delete the rest. It’s important to learn how your e-mail client (the program you use to send and receive e-mail) handles thorough deleting; in Outlook Express, for example, you have to delete an e-mail you don’t want from your inbox, delete it from the “Deleted” folder, and then compact folders before you are genuinely rid of it.


2001 ◽  
Vol 25 (10) ◽  
pp. 395-396
Author(s):  
Trevor Hicks ◽  
Martin Briscoe

Journals on-lineThe British Journal of Psychiatry (BJP), Psychiatric Bulletin and Advances in Psychiatric Treatment have been available at www.rcpsych.org since May 2000 (Fig. 1). During the initial free trial period all users of the internet had access to the full content of these journals on-line. This period ended on 31 January 2001. Access to full text is now limited to subscribers only; but access to electronic tables of contents (eTOCs), abstracts and the ability to search full text will continue to be available. Individuals or institutions who subscribe to BJP in print or are Members of the College are now able to activate an on-line subscription and select a username and password by entering a subscriber number. The eTOC service allows anyone who registers his or her e-mail address to be notified via e-mail when new content goes on-line. Users may choose to receive any or all of the following: notification that a new issue of BJP is on-line; a complete eTOC for new issues; and special announcements from the College.


2019 ◽  
Vol 2019 (4) ◽  
pp. 6-33 ◽  
Author(s):  
Kirill Nikitin ◽  
Ludovic Barman ◽  
Wouter Lueks ◽  
Matthew Underwood ◽  
Jean-Pierre Hubaux ◽  
...  

Abstract Most encrypted data formats leak metadata via their plaintext headers, such as format version, encryption schemes used, number of recipients who can decrypt the data, and even the recipients’ identities. This leakage can pose security and privacy risks to users, e.g., by revealing the full membership of a group of collaborators from a single encrypted e-mail, or by enabling an eavesdropper to fingerprint the precise encryption software version and configuration the sender used. We propose that future encrypted data formats improve security and privacy hygiene by producing Padded Uniform Random Blobs or PURBs: ciphertexts indistinguishable from random bit strings to anyone without a decryption key. A PURB’s content leaks nothing at all, even the application that created it, and is padded such that even its length leaks as little as possible. Encoding and decoding ciphertexts with no cleartext markers presents efficiency challenges, however. We present cryptographically agile encodings enabling legitimate recipients to decrypt a PURB efficiently, even when encrypted for any number of recipients’ public keys and/or passwords, and when these public keys are from different cryptographic suites. PURBs employ Padmé, a novel padding scheme that limits information leakage via ciphertexts of maximum length M to a practical optimum of O(log log M) bits, comparable to padding to a power of two, but with lower overhead of at most 12% and decreasing with larger payloads.


10.28945/2372 ◽  
2001 ◽  
Author(s):  
Thomas Benesch

For a long time researchers have been considered the question of the use of Internet for its users. In this study we do not want to execute a collection over companies or an entire state, but to limit us to a user group, the students of the Graz University of Technology.From the total extent of the students with a valid e-mail address a representative sample survey has been carried out. To those students a message, which refers to the questionnaire, was sent by means of e-mail. The questionnaire is available electronically at the WWW. The results of this study give us a view, how strong electronic services determined and as which medium it is used.


Sign in / Sign up

Export Citation Format

Share Document