IJRAR(ISSN 2348 –1269, Print ISSN 2349-5138 ) | UGC Approved Journal | UGC Journal | UGC

International Journal of Research and Analytical Reviews (IJRAR)

International Peer Reviewed, Open Access Journal

E-ISSN 2348-1269, P- ISSN 2349-5138 | ESTD Year: 2014

Read all new guidelines related publication before submission or publication .

Login to Author Home
IJRAR.COM Old Paper
Repository

  IJRAR Search Xplore - Search by Paper id, Published paper id, Paper Name , Author Name, and Paper Title
Search Your Paper Details.

All Published Paper Digital Library Search Through below Search Option.

  IJRAR Search Xplore - Search by Paper Name , Author Name, and Title
All Published Paper Details Search Through Above Search Option.

The INTERNATIONAL JOURNAL OF RESEARCH AND ANALYTICAL REVIEWS (IJRAR) aims to explore advances in research pertaining to applied, theoretical and experimental Technological studies. The goal is to promote scientific information interchange between researchers, developers, engineers, students, and practitioners working in and around the world.


Indexing In Google Scholar, ResearcherID Thomson Reuters, Mendeley : reference manager, Academia.edu, arXiv.org, Research Gate, CiteSeerX, DocStoc, ISSUU, Scribd, and many more

INTERNATIONAL JOURNAL OF RESEARCH AND ANALYTICAL REVIEWS (IJRAR)
E-ISSN 2348-1269, P- ISSN 2349-5138 | Impact factor: 5.75 | ESTD Year: 2014 | UGC and ISSN Approved.
Provide DOI and Hard copy of Certificate.
Low Open Access Publication.
Call For Paper (Volume 6 | Issue 2 | Month- Submit your paper Anytime no Deadline Published in A-J Issue 2019)

Volume 6 | Issue 2

  Paper Title: ANALYSIS OF CROSS SITE REQUEST FORGERY ATTACK ON WEBKIT

  Publisher Journal Name: IJRAR

  DOI Member: 10.6084/m9.doi.one.IJRAR1AYP034

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1AYP034

  Register Paper ID - 212473

  Title: ANALYSIS OF CROSS SITE REQUEST FORGERY ATTACK ON WEBKIT

  Author Name(s): Anand Patil, Ajay Yadav, Hari Krishnan, Raju Prasad

 Publisher Journal name: IJRAR

 Volume: 6

 Issue: 2

 Pages: 145-155

 Year: June 2019

 Downloads: 151

 Abstract

Cross Site Request Forgery is considered to be one of the key security holes on the Web today, where an untrusted Web site can force the user browser to send the unauthorized valid request to the trusted site. In contrast, Cross Site Request Forgery (XSRF) attacks have received little attention. An XSRF attack exploits the trust of a Web application in the authenticated users by providing the attacker with arbitrary HTTP requests on behalf of a victim. The problem is that web applications usually respond to such requests without verifying that the actions that they have taken are actually intended. Because XSRF represents a relatively new security issue, it is largely unknown to web application developers. So far, many solutions have been proposed for CSRF attacks. For example, the referrer HTTP header, the custom HTTP header, the Origin header, the client site proxy, the browser plug-in, and the random token validation. However, existing solutions are not so immune that they prevent this attack. All solutions are only partially protected. Many Web applications are not completely secure, particularly against the CSRF vulnerability. Cross Site Request Forgery is one of the top ten vulnerabilities selected by the OWASP, ranking third in terms of severity after SQL Injection and Cross Site Scripting. [7] Another interesting fact is that these attacks, if properly executed, can be very damaging to web applications. The state change function remains the main focus of the attackers.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

security threats, security breaches, browser security, forgery prevention, defense mechanisms, open web application security.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: STEGANOGRAPHY USING AES ALGORITHM

  Publisher Journal Name: IJRAR

  DOI Member: 10.6084/m9.doi.one.IJRAR1AYP033

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1AYP033

  Register Paper ID - 212474

  Title: STEGANOGRAPHY USING AES ALGORITHM

  Author Name(s): Animesh Kumar, Deepak Idnani, Kaushal soni, Nitin Taneja, Rounak Shrivastava

 Publisher Journal name: IJRAR

 Volume: 6

 Issue: 2

 Pages: 139-144

 Year: June 2019

 Downloads: 69

 Abstract

Steganography is the method of hiding the data where sharing of data is present, by hiding data in other data. Steganography is becoming one of the most necessary as more people are joining the revolution of the cyberspace. In comparison to cryptography, it is used to keep strangers from knowing about the hidden data but it is to keep strangers from thinking that the data is even existing. Steganography consists of an array of secret connection methods that hide the data from being identified or seen. For hiding secret information in the image, there exist a huge number of methods of steganography methods some of them are even more complex than strangers all the graphical user interface have there some of the loose points or stronger points. Different application really needs absolute mortality of the secret information, while different application needs a huge secret data to be hidden. In this proposal, the report brings out the intends to give just an overview of image steganography, its uses, and different methods and also in additional security to both the information hidden and that image carries the data. Security is made available by encrypting the information that is transferred in the image and again encrypting the image that has the data using the AES algorithm. This method provides a double security layer to the data.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Steganography Using AES Algorithm

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: ANALYSING REMOTE KEYLESS ENTITY SYSTEMS

  Publisher Journal Name: IJRAR

  DOI Member: 10.6084/m9.doi.one.IJRAR1AYP032

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1AYP032

  Register Paper ID - 212475

  Title: ANALYSING REMOTE KEYLESS ENTITY SYSTEMS

  Author Name(s): KiranRaj KG, Shahikant Khot, Ananya Choudhary, Ratan Singh

 Publisher Journal name: IJRAR

 Volume: 6

 Issue: 2

 Pages: 136-138

 Year: June 2019

 Downloads: 40

 Abstract

For many years, security has been extensively studied for immobilizers and remote keyless entry systems. Apart from relay threats, there was little attention paid to active, keyless entry and start devices that are commonly used for luxury vehicles. In this venture we completely reverse engineer and complete a Passive Keyless Entry & Start Program. Our analysis shows several vulnerabilities in security. In keeping with a previously adopted strategy, Jam-listen-replay, our new attack strategy requires only a jammer and a signal logger. We conducted attacks on six different car models that are shown to be effective. In all the cases tested and with a broad range of system parameters, the attack is successful. We also contrast our approach with state-of-the-art assaults, demonstrate that the found weaknesses improve in past attacks, and conclude that remote keyless entity system implementations are not secure.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Remote Entity Attacks, Modern supercar vulnerability, Supercars hijacking.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: REVIEW OF DISTRIBUTED DENIAL OF SERVICE ATTACK ON THE CLOUD ENVIRONMENT

  Publisher Journal Name: IJRAR

  DOI Member: 10.6084/m9.doi.one.IJRAR1AYP031

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1AYP031

  Register Paper ID - 212476

  Title: REVIEW OF DISTRIBUTED DENIAL OF SERVICE ATTACK ON THE CLOUD ENVIRONMENT

  Author Name(s): Rohit Goyal, Gourav Patil, Milind Gupta, Arpit raj, Payal Kaur

 Publisher Journal name: IJRAR

 Volume: 6

 Issue: 2

 Pages: 127-135

 Year: June 2019

 Downloads: 45

 Abstract

The number of users on the cloud is increasing day by day as the cloud ensures availability securing of data services and resources. DDoS(Distributed denial of services) attacks are the second most commonly cybercrime. This attack can drain the cloud resources, consumes most of its bandwidth and damage the entire cloud services within a short period of time. There are many procedure which can be approved to ease the DDos attack such as classification, encryptions techniques. In this paper, we describe the attack perform in the cloud environment.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Cloud computing, DDos, cloud security

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: IMPLEMENTATION AND BEHAVIOUR ANALYSIS OF HONEYPOT

  Publisher Journal Name: IJRAR

  DOI Member: 10.6084/m9.doi.one.IJRAR1AYP030

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1AYP030

  Register Paper ID - 212477

  Title: IMPLEMENTATION AND BEHAVIOUR ANALYSIS OF HONEYPOT

  Author Name(s): Mintu Patel, Needa Mugut, Shubham Telkar

 Publisher Journal name: IJRAR

 Volume: 6

 Issue: 2

 Pages: 120-126

 Year: June 2019

 Downloads: 39

 Abstract


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

firewall, intrusion detection, computer networks, implementation.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: EVOLUTION OF RANSOMWARE, ATTACKS AND PREVENTION.

  Publisher Journal Name: IJRAR

  DOI Member: 10.6084/m9.doi.one.IJRAR1AYP029

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1AYP029

  Register Paper ID - 212478

  Title: EVOLUTION OF RANSOMWARE, ATTACKS AND PREVENTION.

  Author Name(s): Rohan Dhadge

 Publisher Journal name: IJRAR

 Volume: 6

 Issue: 2

 Pages: 116-119

 Year: June 2019

 Downloads: 25

 Abstract


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Evolution of Ransomware, Attacks and Prevention.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: BOTNET DETECTION USING TRAFFIC ANALYSIS AND DEFENSES

  Publisher Journal Name: IJRAR

  DOI Member: 10.6084/m9.doi.one.IJRAR1AYP028

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1AYP028

  Register Paper ID - 212479

  Title: BOTNET DETECTION USING TRAFFIC ANALYSIS AND DEFENSES

  Author Name(s): Shreyash Mulik, Aishwarya Patil

 Publisher Journal name: IJRAR

 Volume: 6

 Issue: 2

 Pages: 108-115

 Year: June 2019

 Downloads: 23

 Abstract

The abstinence progression of Botnet malware made it acutely serve to detect. Even though it can be just considered as a tool, now attackers who are not at all more stimulated to just attract media attention by infecting a huge number of computers on the network. They are used to allocate direction to the Bots for malicious actions such as distributed denial-of-service (DDOS) occurrences, junk and phishing. Huge number of the prevalent Botnet detection techniques only on particular Botnet command and control and structures and can develop into inflated as Botnets change their construction and C&C techniques. A Bot is a type of malware that allows an attacker to take control of infected machine. The Botnet is a network of bots. A Bot infected machine is often called as zombie and cybercriminals who control these bots are called Botherders. Bots are often spread themselves across internet by searching for unsafe machines to expand. The way the bots are controlled depends upon architecture of botnet Command and Control mechanism which may be based on Internet Relay Chat or HTTP or Peer to Peer. Botnet is widely used to carry out malicious activities like Distributed Denial of Service (DDoS) attacks, sending spam mails and click frauds. In recent years, botnet-based attacks have become more sophisticated and can bypass all security safeguards.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Traffic behavior analysis, Botnet, Cyber security, IRC, C&C, DDOS

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: REVIEW ON THREATS IN IOT SECURITY.

  Publisher Journal Name: IJRAR

  DOI Member: 10.6084/m9.doi.one.IJRAR1AYP027

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1AYP027

  Register Paper ID - 212480

  Title: REVIEW ON THREATS IN IOT SECURITY.

  Author Name(s): ADESH DARAWADE, SANKET GAIKWAD, SIDDHI JADHAV, SUYASH CHAVAN

 Publisher Journal name: IJRAR

 Volume: 6

 Issue: 2

 Pages: 103-107

 Year: June 2019

 Downloads: 23

 Abstract

IOT is the Connections of nested technologies that consist of physical objects and is used to communicate and interact or savvy with the inner states or the external surrounding. Similarly, then community to community the communication varies, IOT emphasis on machine to machine communication. This paper mainly enlightens the position of IOT growth In India, also contains security issues assert and challenges. At last, this paper reports the Risk factor, security issues and challenges in Indian perspective. To be adequate to implement technologies in an ever-growing trend demands high privacy, security, authentication, backup and recovery from attacks. Such, evolving technologies and services convey significant economic and social benefits, although when misused pose serious risks and threats to business, individuals and societies. The paper further will discuss various IOT security threats and privacy related security challenges due to the vulnerabilities of connected and embedded systems and the ground working communication and silicon technologies will give study and reasoning of evolving and upcoming IOT security technologies and most advanced level of IOT security research directions.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

IOT (IOT), Challenges, Interoperability, Authenticity, Technology, Threats.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: ANALYSIS OF STATISTICAL DATA OF CYBER ATTACKS IN HISTORY

  Publisher Journal Name: IJRAR

  DOI Member: 10.6084/m9.doi.one.IJRAR1AYP026

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1AYP026

  Register Paper ID - 212481

  Title: ANALYSIS OF STATISTICAL DATA OF CYBER ATTACKS IN HISTORY

  Author Name(s): Anmol Hariyani, Harsh Shah

 Publisher Journal name: IJRAR

 Volume: 6

 Issue: 2

 Pages: 98-102

 Year: June 2019

 Downloads: 25

 Abstract

With a major advancement in technology nowadays one can always see the rising number of different types of cyber attacks which are widely targeting almost all aspects of technology. So one needs to understand clearly about attacks to prevent the repercussions of cyber attack. To understand the attacks more clearly one needs to know about the cyber attacks that is from how it happened and how it started spreading rapidly with the advancement of technology. So this research paper provides one with detailed information about how different types of cyber attacks came into the picture, how the cyber attack took place, what were the outcomes of those cyber attacks and how it started spreading all over. All the detailed information of major attacks is mentioned in this paper and advancement in all types of attacks is being mentioned below statistically to get a clear picture of all types of attack.One can refer to this paper to understand the history of different types of cyber attacks.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Stats, Cyber Attacks in history, Analysis, Virus, Worm, Ransomware, DOS

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: SOUND AND PRECISE ANALYSIS OF WEB APPLICATIONS FOR INJECTION VULNERABILITIES

  Publisher Journal Name: IJRAR

  DOI Member: 10.6084/m9.doi.one.IJRAR1AYP025

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1AYP025

  Register Paper ID - 212482

  Title: SOUND AND PRECISE ANALYSIS OF WEB APPLICATIONS FOR INJECTION VULNERABILITIES

  Author Name(s): Hiren Chafekar, Kasireddi.Himabindu, Rahul Agarwal

 Publisher Journal name: IJRAR

 Volume: 6

 Issue: 2

 Pages: 91-97

 Year: June 2019

 Downloads: 26

 Abstract

Nowadays web applications are the major targets for the hackers. It is an application program which is stored remotely on a server. It can be utilized using web browser over the internet .There are different type of techniques such as SQL injection, cross-site scripting,etc. through which web applications vulnerabilities can be exploited. In this paper the authors have tried to provide mitigation to reduce the adverse effect of exploitation of web vulnerabilities.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Web application vulnerabilities, Mitigations, Techniques used to exploit, Security, Verification

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: INTRUSION DETECTION SYSTEM AND ITS VARIATIONS

  Publisher Journal Name: IJRAR

  DOI Member: 10.6084/m9.doi.one.IJRAR1AYP024

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1AYP024

  Register Paper ID - 212483

  Title: INTRUSION DETECTION SYSTEM AND ITS VARIATIONS

  Author Name(s): Shivam Singh, Omkar Shendre, Nilesh Gujar, Himanshu Agarwal, Ratan Singh

 Publisher Journal name: IJRAR

 Volume: 6

 Issue: 2

 Pages: 87-90

 Year: June 2019

 Downloads: 20

 Abstract

Intrusion Detection System (IDS) is a software application that monitors network or system activity and detects any malicious activity. The tremendous growth and use of the Internet raises concerns about how to protect and transmit digital information in a secure way. Currently, hackers use various types of attacks to obtain valuable information. Many intrusion detection methods, techniques and algorithms help detect these attacks. This main goal of this article is to provide a complete study on the definition of intrusion detection, history, types of intrusion detection, types of attacks, various tools.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Intrusion detection, Functionality, IDS attacks and Types,Tools.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: STUDY ON SPORTS ANALYTICS

  Publisher Journal Name: IJRAR

  DOI Member: 10.6084/m9.doi.one.IJRAR1AYP023

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1AYP023

  Register Paper ID - 212485

  Title: STUDY ON SPORTS ANALYTICS

  Author Name(s): ADITYA RAOSAHEB SABLE, AKSHAY RAO, VIVEK WARE

 Publisher Journal name: IJRAR

 Volume: 6

 Issue: 2

 Pages: 85-86

 Year: June 2019

 Downloads: 46

 Abstract

For each significant game, analysts can and frequently extricate a lot of data, which can be utilized by media and fans, competitors, and associations. These endeavors are regularly done in a joint effort with driving innovation merchants, who likewise have perceived the colossal estimation of sports examination. The omnipresence, decent variety, and relative openness of sports data makes it an especially appealing space for a scope of perception analysts. Inspired by the critical development and prevalence just as by and large capability of sports data perception, this exceptional issue accumulates best in class examine on this rising subject.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Analysts,visualisation,game,data,examination.

  License

Creative Commons Attribution 4.0 and The Open Definition

IJRAR.ORG
ISSN
E-ISSN 2348-1269,
P- ISSN 2349-5138
UGC ISSN APPROVED
Journal Starting Year (ESTD) : 2014
Impact Factor
DOI Details

Providing A Free digital object identifier by DOI.one How to get DOI?
Open Access
This material is Open Knowledge
This material is Open Data
This material is Open Content