Proposing 3SEMCS- Three Step Encryption Method for Cyber Security in Modern Cryptography

Cyber security is a critical issue now a days in various different domains in different disciplines. This paper presents a review analysis of cyber hacking attacks along with its experimental results and proposes a new methodology 3SEMCS named as three step encryption method for cyber security. By utilizing this new designed methodology, security at highest level will be easily provided especially on the time of request submission in the search engine as like google during client server communication. During its working a group of separate encryption algorithms are used. The benefit to utilize this three step encryption is to provide more tighten security by applying three separate encryption algorithms in each phase having different operations. And the additional benefit to utilize this methodology is to run over new designed private browser named as “RR” that is termed as Rim Rocks correspondingly this also help to check the authenticated sites or phishing sites by utilizing the strategy of passing URL address from phishing tank. This may help to block the phisher sites and user will relocate on previous page. The purpose to design this personnel browser is to enhance the level of security by sign_in on the time of client server communication that correspondingly reduce the normal attacks on browser based attacks as like ManIn-The-Middle-Attack (MITMA). This new designed private browser may help to provide online security by applying 3step automatic encryption on path during request movement of google page from the one to the next or ultimately/towards web server by following auto-generated encrypted hash address approach. At end, this rim rocks browser provides tighten security with anti-phishing facility during client server communication.

[1]  Christopher Krügel,et al.  Protecting users against phishing attacks with AntiPhish , 2005, 29th Annual International Computer Software and Applications Conference (COMPSAC'05).

[2]  Lorrie Faith Cranor,et al.  Cantina: a content-based approach to detecting phishing web sites , 2007, WWW '07.

[3]  Chase Qishi Wu,et al.  An integrated cyber security monitoring system using correlation-based techniques , 2009, 2009 IEEE International Conference on System of Systems Engineering (SoSE).

[4]  Shujun Li,et al.  A novel anti-phishing framework based on honeypots , 2009, 2009 eCrime Researchers Summit.

[5]  Ion Lungu,et al.  Optimizing Anti-Phishing Solutions Based on User Awareness, Education and the Use of the Latest Web Security Solutions , 2010 .

[6]  Joseph Paul Cohen,et al.  Challenge Based Learning in Cybersecurity Education , 2011 .

[7]  Brian M. Bowen,et al.  Measuring the human factor of cyber security , 2011, 2011 IEEE International Conference on Technologies for Homeland Security (HST).

[8]  Tudor Dumitras,et al.  Experimental Challenges in Cyber Security: A Story of Provenance and Lineage for Malware , 2011, CSET.

[9]  Terry V. Benzel The science of cyber security experimentation: the DETER project , 2011, ACSAC '11.

[10]  Yang Xin,et al.  An Empirical Analysis of the Effectiveness of Browser-based Antiphishing Solutions , 2012 .

[11]  A. Diop Journal of Theoretical and Applied Information Technology , 2012 .

[12]  Shari Lawrence Pfleeger,et al.  Leveraging behavioral science to mitigate cyber security risk , 2012, Comput. Secur..

[13]  U. Vidya Sagar,et al.  Intelligent Phishing Website Detection and Prevention System by Using Link Guard Algorithm , 2013 .

[14]  Vinod Kumar Sharma,et al.  Multiphase Encryption: A New Concept in Modern Cryptography , 2013 .

[15]  Ali Selamat,et al.  A survey on malware propagation, analysis, and detection , 2013 .

[16]  Mounika Reddy,et al.  A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY , 2013 .

[17]  Rimmy Chuchra,et al.  Use of web Mining in Network Security , 2013 .

[18]  David Whyte,et al.  Securing Canada's Information-Technology Infrastructure: Context, Principles, and Focus Areas of Cybersecurity Research , 2013 .

[19]  G. Nikhita Reddy,et al.  A Study Of Cyber Security Challenges And Its Emerging Trends On Latest Technologies , 2014, ArXiv.

[20]  Eduard H. Hovy,et al.  A taxonomy and a knowledge portal for cybersecurity , 2014, DG.O.

[21]  Rossouw von Solms,et al.  A conceptual framework for cyber-security awareness and education in SA , 2014, South Afr. Comput. J..

[22]  Piyush Bhatia,et al.  Type of Security Threats and its Prevention , 2014 .

[23]  Raghav Gupta,et al.  A Review of Cyber Security Techniques for Critical Infrastructure Protection , 2014 .

[24]  Rita Tehan Cybersecurity: Authoritative Reports and Resources, by Topic , 2014 .

[25]  Ali Selamat,et al.  Current state of anti-phishing approaches and revealing competencies , 2014 .

[26]  Rajendra Gupta,et al.  System Design, Investigation and Countermeasure of Phishing Attacks using Data Mining Classification Methods and its Analysis , 2015 .

[27]  Tobby Simon,et al.  The Impact of the Dark Web on Internet Governance and Cyber Security , 2015 .

[28]  Shubham Chuchra,et al.  Proposing Operational Technology Based Procedure (OTBP) using Round Robin Scheduling Algorithm (RRSA) , 2015 .