Abstract Proceedings of ICIRESM – 2020
Full conference PDF is available to the subscribed user. Use your subscription login to access,
DATA SPOOFING AND INTRUSION DETECTION SYSTEM AES ALGORITHM
Data spoofing and intrusion detection systems are becoming increasingly important as more and more sensitive data is stored in centralized storage devices. These systems can help to detect unauthorized requests for information, phishing attacks, and prevent access to files that do not have the proper permissions.This project proposes a data spoofing and intrusion detection system that uses the AES algorithm to store files in encrypted form in a centralized storage system. The system also uses a variety of other techniques to detect unauthorized requests, including:Data stream analysis: The system analyzes data streams to identify patterns that are indicative of unauthorized access.File access monitoring: The system monitors file access to identify attempts to access files that do not have the proper permissions.User behavior analysis: The system analyzes user behavior to identify patterns that are indicative of unauthorized access.The proposed system has been implemented and tested, and it has been shown to be effective in detecting unauthorized requests and preventing access to files that do not have the proper permissions.
data spoofing, intrusion detection system, AES algorithm, centralized storage, data stream analysis, file access monitoring, user behavior analysis
13/11/2020
175
20175
IMPORTANT DAYS
Paper Submission Last Date
October 20th, 2024
Notification of Acceptance
November 7th, 2024
Camera Ready Paper Submission & Author's Registration
November 1st, 2024
Date of Conference
November 15th, 2024
Publication
January 30th, 2025