CFP last date
20 May 2024
Reseach Article

Security and Authentication of Web Browsers using FCM

by Harish Singh Baghel, Bharat Mishra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 104 - Number 13
Year of Publication: 2014
Authors: Harish Singh Baghel, Bharat Mishra
10.5120/18264-9247

Harish Singh Baghel, Bharat Mishra . Security and Authentication of Web Browsers using FCM. International Journal of Computer Applications. 104, 13 ( October 2014), 29-32. DOI=10.5120/18264-9247

@article{ 10.5120/18264-9247,
author = { Harish Singh Baghel, Bharat Mishra },
title = { Security and Authentication of Web Browsers using FCM },
journal = { International Journal of Computer Applications },
issue_date = { October 2014 },
volume = { 104 },
number = { 13 },
month = { October },
year = { 2014 },
issn = { 0975-8887 },
pages = { 29-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume104/number13/18264-9247/ },
doi = { 10.5120/18264-9247 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:36:05.193658+05:30
%A Harish Singh Baghel
%A Bharat Mishra
%T Security and Authentication of Web Browsers using FCM
%J International Journal of Computer Applications
%@ 0975-8887
%V 104
%N 13
%P 29-32
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Web security is an important field area where security and storage is important during the flow of data from the client to server. Although there are various techniques implemented for the security of web data especially at the client side in web browsers. Here in this paper an efficient technique for the security of web data is implemented using combinatorial method of clustering and classification. The web log data collected at the server side is used for the training and testing of classification of various attacks and anomalies in the packets send through internet. The Fuzzy C-means clustering is first applied on the web log data to divide into a number of clusters of similar groups and then these clustered data are passed to the classification algorithm to generate decision tree to get the final classification of attacks and anomalies.

References
  1. Nicholas Carlini, Adrienne Porter Felt and David Wagner "An Evaluation of the Google Chrome Extension Security Architecture", 2012
  2. Sruthi Bandhakavi, Samuel T. King, P. Madhusudan and Marianne Winslett "VEX: Vetting Browser Extensions For Security Vulnerabilities", 2010
  3. Amogh Kulkarni, Jaison Salu John, Yohan John Thampi, Shravan Udaykumar, Gaurav Prasad and Vrinda Halarnkar "Web Browsers", 2009.
  4. Dawn Parzych "Caching Behavior of Web Browsers", Acceleration System Architect (ASA), F5 Networks, Nov- 2007.
  5. Alan Grosskurth and Michael W. Godfrey "Architecture and evolution of the modern web browser", Elsevier Science, 2006
  6. Cristiana Armaroli, Ivano Azzini, Lorenza Ferrari, Toni Giorgino, Luca Nardelli, Marco Orlandi and Carla Rognoni "An Architecture for a Multi-Modal Web Browser", 2001
  7. "How Web Browsers Work" Chapter 18, PART 4 HOW THE WORLD WIDE WEB WORKS.
  8. Dr. Bharat Mishra, Harish Singh Baghel,Manoj Patil and Pramod Singh "Study & Analysis of various Protocols in popular Web Browsers", International Journal of Advancements in Research & Technology, August-2012.
  9. Gregor Wagner, Andreas Gal, Christian Wimmer, Brendan Eich and Michael Franz "Compartmental Memory Management in a Modern Web Browser", ACM 978-1-4503-0263-0/11/06, 2011
  10. Charles Reis and Steven D. Gribble "Isolating Web Programs in Modern Browser Architectures",ACM 978-1-60558-482-9/09/04, 2009.
  11. Mike Ter Louw, Jin Soon Lim and V. N. Venkatakrishnan "Enhancing web browser security against malware extensions", Springer, 2008.
  12. Adam Barth, Collin Jackson and John C. Mitchell "Securing Frame Communication in Browsers", 2008
  13. Jennifer Kahng "Evaluating Web Browser Security Interfaces for a More Meaningful Design", 2001
  14. Michael J. Rees "Evolving the Browser towards a Standard User Interface Architecture", AUIC2002
Index Terms

Computer Science
Information Sciences

Keywords

WWW WML Clustering Classification Fuzzy logics.