Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Security and Authentication of Web Browsers using FCM

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 104 - Number 13
Year of Publication: 2014
Authors:
Harish Singh Baghel
Bharat Mishra
10.5120/18264-9247

Harish Singh Baghel and Bharat Mishra. Article: Security and Authentication of Web Browsers using FCM. International Journal of Computer Applications 104(13):29-32, October 2014. Full text available. BibTeX

@article{key:article,
	author = {Harish Singh Baghel and Bharat Mishra},
	title = {Article: Security and Authentication of Web Browsers using FCM},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {104},
	number = {13},
	pages = {29-32},
	month = {October},
	note = {Full text available}
}

Abstract

Web security is an important field area where security and storage is important during the flow of data from the client to server. Although there are various techniques implemented for the security of web data especially at the client side in web browsers. Here in this paper an efficient technique for the security of web data is implemented using combinatorial method of clustering and classification. The web log data collected at the server side is used for the training and testing of classification of various attacks and anomalies in the packets send through internet. The Fuzzy C-means clustering is first applied on the web log data to divide into a number of clusters of similar groups and then these clustered data are passed to the classification algorithm to generate decision tree to get the final classification of attacks and anomalies.

References

  • Nicholas Carlini, Adrienne Porter Felt and David Wagner "An Evaluation of the Google Chrome Extension Security Architecture", 2012
  • Sruthi Bandhakavi, Samuel T. King, P. Madhusudan and Marianne Winslett "VEX: Vetting Browser Extensions For Security Vulnerabilities", 2010
  • Amogh Kulkarni, Jaison Salu John, Yohan John Thampi, Shravan Udaykumar, Gaurav Prasad and Vrinda Halarnkar "Web Browsers", 2009.
  • Dawn Parzych "Caching Behavior of Web Browsers", Acceleration System Architect (ASA), F5 Networks, Nov- 2007.
  • Alan Grosskurth and Michael W. Godfrey "Architecture and evolution of the modern web browser", Elsevier Science, 2006
  • Cristiana Armaroli, Ivano Azzini, Lorenza Ferrari, Toni Giorgino, Luca Nardelli, Marco Orlandi and Carla Rognoni "An Architecture for a Multi-Modal Web Browser", 2001
  • "How Web Browsers Work" Chapter 18, PART 4 HOW THE WORLD WIDE WEB WORKS.
  • Dr. Bharat Mishra, Harish Singh Baghel,Manoj Patil and Pramod Singh "Study & Analysis of various Protocols in popular Web Browsers", International Journal of Advancements in Research & Technology, August-2012.
  • Gregor Wagner, Andreas Gal, Christian Wimmer, Brendan Eich and Michael Franz "Compartmental Memory Management in a Modern Web Browser", ACM 978-1-4503-0263-0/11/06, 2011
  • Charles Reis and Steven D. Gribble "Isolating Web Programs in Modern Browser Architectures",ACM 978-1-60558-482-9/09/04, 2009.
  • Mike Ter Louw, Jin Soon Lim and V. N. Venkatakrishnan "Enhancing web browser security against malware extensions", Springer, 2008.
  • Adam Barth, Collin Jackson and John C. Mitchell "Securing Frame Communication in Browsers", 2008
  • Jennifer Kahng "Evaluating Web Browser Security Interfaces for a More Meaningful Design", 2001
  • Michael J. Rees "Evolving the Browser towards a Standard User Interface Architecture", AUIC2002