Journal of Computer, Internet and Network Security [ISSN: 2457-0176 (online)]

Journal of Computer, Internet and Network Security.

The risk of invasion through internet has generated enormous concern about information and computer security among businesses, governments, legislators, academics, researchers, scientists and the public. 
The Journal of Computer, Internet and Network Security deals with the theory, design, implementation, analysis, and application of secure information and computer systems.

Some of the topics covered under this journal (but not limited to them) are:

    • TCP/IP
    • Internet Protocol Security (IP)
    • Firewalls
    • Antivirus software
    • Secure coding
    • Security Token
    • Email Security
    • Malicious Software
    • Phishing
    • Security by design
    • Secure operating systems
    • Application Vulnerabilities
    • Access Control Systems
    • Application security
    • Authentication
    • Intrusion system

Vol 3, No 1 (2018): A Novel Trust Propagation Model with Deceptive Recommendation Penalty Scheme for DDOS Attacks

Authors: Prabakeran Saravanan, Dr T.Sethukarasi, Indumathi V

Abtract: Securing system exercises through a conveyed assignment of checking and alleviation is been taken after finished a long time by different scientists. The pre-task models of the so far proposed technique is exceedingly versatile against DDoS; the post-agent nature of the strategies need lacking neighbors to hold the procedure as previously. In particular, enhancement based strategies result in neighborhood optima issue from which a constrained arrangement sets are separated from everyone else determined. Despite the fact that the streamlining produces better utilizing arrangements, the neighborhood optima joining may not deliver a superior impact over securing the system. Trade of control messages tasks to be weak in existing together with the improvement strategy This retards the network resilience alongside the intrinsic behavior of the optimization technique .so in this paper we present a new approach for a trust based propagation model in the context of recommender systems. The idea of this modeling is that trust worthiness in a particular user depends not only on the trust value in the opinion of that user but also on the deceptive recommendation penalty feedback system Experimental results on real-world data sets demonstrate the effectiveness of the proposed approach.

Full Issue

View or download the full issue PDF

Table of Contents