Date of Publication :7th July 2016
Abstract: Denial-of-Service (DoS) attacks are a essential threat to the web. These attacks are targeting the application level. Detecting application layer DOS attack is not a straightforward task. A more refined mechanism is needed to distinguish the malicious ensue the legitimate ones. This paper implements a detection scheme primarily based on the PGP cryptography and PGP decoding technique, in which the users will transfer the file. The user can transfer the file primarily based on the random generated key of a private user. Pretty Good Privacy (PGP) is a encryption and decoding worm that gives scientific discipline privacy and authentication for electronic communication. PGP is often used for language, encrypting, and decrypting texts, emails, files, and directories
Reference :
-
- Shihab A. Hameed; Habib Yuchoh; Wajdi F. Al-khateeb, “A model for ensuring data confidentiality: In healthcare and medical emergency”, Print ISBN: 978-1-61284- 435-0, 2011, IEEE
- http://web.townsendsecurity.com/bid/66064/AES-vs PGP-What-is-the-Difference
- http://www.goanywhere.com/products/mft/encryption
- Saranya, Vinothini, Vasumathi, “A Study on RSA Algorithm for Cryptography”, International Journal of Computer Science and Information Technologies, Vol. 5 (4) 2014
- https://www.javacodegeeks.com/2011/06/java-pretty- good-privacy-pgp.html
- http://www.bouncycastle.org/java.html
- http://www.bouncycastle.org/java.html
- https://www.bouncycastle.org/documentation.html
- Veronika Durcekova, Ladislav Schwartz and Nahod Shahmehri, “Sophistucated Denial of Service Attacks Aimed at Application Layer”, Print ISBN: 978-1-4673- 1179-3,2012, IEEE
- Bharatratna Pralhadrao Gaikwad, “Cryptographi Process For Cyber Safeguard by using PGP, ISSN Print: 2320- 9798, 2014, IJIRCCE
- Kamarudin Shafinah, Mohammad Mohd Ikram, “File Security based on Pretty Good Privacy (PGP) Concept”, Computer and Information Science, Vol. 4, No. 4; July 2011