scholarly journals Integrated Approach of Malicious Website Detection

Author(s):  
Krishnaveni Raju ◽  
C. Chellappan

With the advent and the rising popularity of Internet, security is becoming one of the focal point. At present, Web sites have become the attacker’s main target. The attackers uses the strategy of embedding the HTML tags, the script tag to include Web-based Trojan scripting or redirector scripting, the embedded object tag which activates the third-party applications to display the embedded object and the advanced strategy is the ARP spoofing method to build malicious website when the attackers cannot gain control of the target website. The attacker hijacks the traffic, then injects the malicious code into the HTML responses to achieve virtual malicious websites. The malicious code embedded in the web pages by the attackers; change the display mode of the corresponding HTML tags and the respective effects invisible to the browser users. The display feature setting of embedded malicious code is detected by the abnormal visibility recognition technique which increases efficiency and reduces maintenance cost. Inclusion of the honey client increases the malicious website detection rate and speed. Most of the malicious Web pages are hence detected efficiently and the malicious code in the source code is located accurately. It can also handle End-User requests to know whether their webpage is free of Malicious codes or not.

Author(s):  
Beth Archibald Tang

At least 15% of the American population has a disability (Kaye, 1998); some estimate it is as high as one in five. For research studies, the United States government usually defines the term disability as a limitation in a person’s major life activities during daily living, working, and attending school (Job Accommodation Network, 1992).1 Assistive technologies—the tools that help individuals complete their daily tasks—serve as adjuncts that help to bridge the gap between dependence and self-reliance. Webmasters2 have their tools, too. They use software that enhance the sites and make them interesting. While Web usability specialists place emphasis on completing tasks, the purpose of some Web sites may be more about evoking a “wow” response, and less about imparting information that visitors can use. On occasion, being able to access these Web pages requires that users go to a third-party Web site and download plug-ins to listen to an audio file, watch a video clip, or read downloaded documents. For people with disabilities, however, many of the Web sites inadvertently establish barriers that could be prevented.


Author(s):  
Md Equebal Hussain ◽  
Mohammad Rashid Hussain

security is one of the most important concern on cloud computing therefore institutions are hesitating to host their data over cloud. Not all data can be afforded to move on the cloud (example accounts data). The main purpose of moving data over cloud is to reduce cost (infrastructure and maintenance), faster performance, easy upgrade, storage capacity but at the same time security is major concern because cloud is not private but maintained by third party over the internet, security issues like privacy, confidentiality, authorization (what you are allowed to do), authentication (who you are) and accounting (what you actually do) will be encountered. Variety of encryption algorithms required for higher level of security. In this paper we try to provide solution for better security by proposing a combined method of key exchange algorithm with encryption technique. Data stored in cloud can be protected from hackers using proposed solution because even if transmitted key is hacked of no use without user’s private key.


2002 ◽  
Vol 7 (1) ◽  
pp. 9-25 ◽  
Author(s):  
Moses Boudourides ◽  
Gerasimos Antypas

In this paper we are presenting a simple simulation of the Internet World-Wide Web, where one observes the appearance of web pages belonging to different web sites, covering a number of different thematic topics and possessing links to other web pages. The goal of our simulation is to reproduce the form of the observed World-Wide Web and of its growth, using a small number of simple assumptions. In our simulation, existing web pages may generate new ones as follows: First, each web page is equipped with a topic concerning its contents. Second, links between web pages are established according to common topics. Next, new web pages may be randomly generated and subsequently they might be equipped with a topic and be assigned to web sites. By repeated iterations of these rules, our simulation appears to exhibit the observed structure of the World-Wide Web and, in particular, a power law type of growth. In order to visualise the network of web pages, we have followed N. Gilbert's (1997) methodology of scientometric simulation, assuming that web pages can be represented by points in the plane. Furthermore, the simulated graph is found to possess the property of small worlds, as it is the case with a large number of other complex networks.


2015 ◽  
Vol 1 (3) ◽  
pp. 351
Author(s):  
Hoger Mahmud Hussen ◽  
Mazen Ismaeel Ghareb ◽  
Zana Azeez Kaka Rash

Recently the Kurdistan Region of Iraq has experienced an explosion in exposure to new technologies in different sectors especially in media and telecommunication. Internet is one of those technologies that have opened a way for information proliferation amongst a previously censored region. Developing web sites to deliver news and other information is a relatively new phenomenon in Kurdistan; this means that the design and development of web pages may lack the quality standard required. In this paper the quality of webpage interface design and usability in the field of news journalism in the KRI is examined against a set of web interface design and usability criterion. For the purpose of data collection 9 available popular news websites are chosen and 900 questionnaires are sent to 100 random users. The result is analyzed and we have found that the majority of users are satisfied with the interface design and usability of the news WebPages, however the result points out some weakness that can be improved. The outcome of this research can be used to enhance website design and usability in the field of journalism in the KRI.


2022 ◽  
Vol 12 (1) ◽  
pp. 1-18
Author(s):  
Umamageswari Kumaresan ◽  
Kalpana Ramanujam

The intent of this research is to come up with an automated web scraping system which is capable of extracting structured data records embedded in semi-structured web pages. Most of the automated extraction techniques in the literature captures repeated pattern among a set of similarly structured web pages, thereby deducing the template used for the generation of those web pages and then data records extraction is done. All of these techniques exploit computationally intensive operations such as string pattern matching or DOM tree matching and then perform manual labeling of extracted data records. The technique discussed in this paper departs from the state-of-the-art approaches by determining informative sections in the web page through repetition of informative content rather than syntactic structure. From the experiments, it is clear that the system has identified data rich region with 100% precision for web sites belonging to different domains. The experiments conducted on the real world web sites prove the effectiveness and versatility of the proposed approach.


2021 ◽  
Vol 15 (4) ◽  
pp. 467-474
Author(s):  
Petra Ptiček ◽  
Ivana Žganjar ◽  
Miroslav Mikota ◽  
Mile Matijević

Information and communication technology is an important factor for national, regional and local sustainable tourism development according to the long-term Croatian national strategic plan. New forms of information, such as web sites; new media, materials, political and social change, all influence tourists’ decisions when choosing specific destinations. The aim of this research is to determine, based on the analysis of the tourism media campaign, the relationship between new communication trends and the application of photography as a medium that influences the experience when choosing a destination and the importance of crucial information factors on web pages based on their technical and visual characteristics.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Tzung-Her Chen ◽  
Ting-Le Zhu ◽  
Fuh-Gwo Jeng ◽  
Chien-Lung Wang

Although encryption and signatures have been two fundamental technologies for cryptosystems, they still receive considerable attention in academia due to the focus on reducing computational costs and communication overhead. In the past decade, applying certificateless signcryption schemes to solve the higher cost of maintaining the certificate chain issued by a certificate authority (CA) has been studied. With the recent increase in the interest in blockchains, signcryption is being revisited as a new possibility. The concepts of a blockchain as a CA and a transaction as a certificate proposed in this paper aim to use a blockchain without CAs or a trusted third party (TTP). The proposed provably secure signcryption scheme implements a designated recipient beforehand such that a sender can cryptographically facilitate the interoperation on the blockchain information with the designated recipient. Thus, the proposed scheme benefits from the following advantages: (1) it removes the high maintenance cost from involving CAs or a TTP, (2) it seamlessly integrates with blockchains, and (3) it provides confidential transactions. This paper also presents the theoretical security analysis and assesses the performance via the simulation results. Upon evaluating the operational cost in real currency based on Ethereum, the experimental results demonstrate that the proposed scheme only requires a small cost as a fee.


Author(s):  
Holly Yu

Through a series of federal and state laws and standards, the legal foundation concerning Web accessibility that impact people with disabilities and their ability to fully overcome digital barriers and participate in the Web environment has been established. Currently, the concept of accessible design or universal design is increasingly becoming an important component of Web design. However, the unanswered questions in laws, the absence of the obligation in fulfilling legal requirements, and the general unawareness of the need to make Web pages accessible have created barriers in implementing the Americans with disabilities Act (ADA), Section 504 of the Rehabilitation Act of 1973, Section 508 of the Rehabilitation Act as amended in 1998, and others. In many cases, the absence of obligations is due to unfamiliarity with legal responsibility of creating accessible Web sites. As a result, the response to Web accessibility concerns frequently comes about only on an ad hoc basis. Identifying these barriers is the first step toward solutions. There are legal and practical approaches for addressing Web accessibility issues in policies, education, research and development, and technology and tools.


2011 ◽  
pp. 1675-1687
Author(s):  
Darin R. Molnar

Leadership in the virtual organization presents unique opportunities and challenges for the manager. Some researchers consider management in the virtual organization to be comprised mainly of challenges while others see it as the opportunity to realize competitive advantage in the global marketplace. Several leadership approaches offer interesting options for the manager within the context of the virtual organization. One standout approach that has gained increasing popularity over the last 30 years is servant leadership in which the leader is servant first. Those managers in virtual organizations who have committed to a practice of servant leadership recognize the need for assessment instruments to help them understand the level of perceived servant leadership characteristics among organizational members under their guidance. This understanding acts as a foundation for training within this context. With this in mind, Laub’s Organizational Leadership Assessment (OLA) offers a reliable survey instrument accepted by the servant leadership practice community. The OLA is easily administered to virtual organization members as a set of Web pages and can be used in conjunction with complementary, third-party data sets such as the World Values Survey database. Future directions for the assessment of servant leadership in the virtual organization include the potential modification of the OLA, as well as the creation of survey instruments to be used in conjunction with it.


Sign in / Sign up

Export Citation Format

Share Document