Traffic Anomaly Detection in DDoS Flooding Attack
Researches have been conducted to overcome Distributed Denial of Service (DDoS) flooding attack. Beside the use of signature based detection, anomaly based detection is also used to detect the attack. Several methods such as statistic, information theory, data mining and forecasting have been proposed. In several researches, they just focused to detect the traffic anomaly, […]
Integration of Kleptoware as Keyboard Keylogger for Input Recorder Using Teensy USB Development Board
Operating a computer to perform everyday tasks is sure to require input devices. The common human interface devices for operating a computer are mouse and keyboard. It means that modifying input devices can be alternative way to do monitoring and logging activity from a user. A keylogger is able to do such functions, but various […]
AN IMPLEMENTATION OF DATA ENCRYPTION FOR INTERNET OF THINGS USING BLOWFISH ALGORITHM ON FPGA
Information security has become an important issue in data communications. One method to ensure the security of data is to use cryptographic method. Cryptography is a method to encode the information to keep the information from being hacked by the other party. The implementation of cryptography is used a significant amount of computer resources. Various […]
Analysing Kleptodata Process on Android Operating System
“The popularity of Android smartphones has increased the number of security threats. One of the security threats is data theft. This study implemented and analyzed the data theft (kleptodata) process on Android operating system. To help the research we built a system that exploits several Android features. An already installed Android application can get the […]