CFP last date
20 May 2024
Reseach Article

A Framework includes Path based Method and Sandbox Techniques for Effective Communication System

by S. Sandhiya, S. Prakasam
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 74 - Number 10
Year of Publication: 2013
Authors: S. Sandhiya, S. Prakasam
10.5120/12923-9928

S. Sandhiya, S. Prakasam . A Framework includes Path based Method and Sandbox Techniques for Effective Communication System. International Journal of Computer Applications. 74, 10 ( July 2013), 44-47. DOI=10.5120/12923-9928

@article{ 10.5120/12923-9928,
author = { S. Sandhiya, S. Prakasam },
title = { A Framework includes Path based Method and Sandbox Techniques for Effective Communication System },
journal = { International Journal of Computer Applications },
issue_date = { July 2013 },
volume = { 74 },
number = { 10 },
month = { July },
year = { 2013 },
issn = { 0975-8887 },
pages = { 44-47 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume74/number10/12923-9928/ },
doi = { 10.5120/12923-9928 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:43:02.542219+05:30
%A S. Sandhiya
%A S. Prakasam
%T A Framework includes Path based Method and Sandbox Techniques for Effective Communication System
%J International Journal of Computer Applications
%@ 0975-8887
%V 74
%N 10
%P 44-47
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The aim of thesis is to implement the embedded sandbox techniques with32 bit RAM processor. Nowadays, many security methods are depends on a effective method in which each issues of attack is countered by a custom-made approach to eliminate the incident. Conventionally access control models are depend on the paradigm of restricting the functions of users that makes protecting users from each other or protecting system resources from users. Heterogeneous network causes some difficulties to maintain, so sandbox method is used to reduce the delay and bandwidth usage. In the proposed method, the memory allocation is required with some shape and approaches all the applications in sequence manner to store. This minimizes the delay in deleting and updating the response data's and makes the system more efficiently. This paper describes solution for these problems through path based approach and sandboxing provides security environment to the data( or information) on Heterogeneous network services.

References
  1. Rakesh Kumar Singh "VI:41-No. 6" Network Awareness In Communication Path For Efficient Support to Network Services" IJCA (March'2012)"
  2. S. Tzu, "VI:30," in The Art of War (Translated by Griffith, S. B. 1971): Oxford University Press, USA, 6th Century BCE.
  3. K. Aytes, S. Byers, and M. Santhanakrishnan, "The Economic Impact of Information Security Breaches: Firm Value and Intra-industry Effects," in Americas Conference on Information Systems (AMCIS) Acapulco, Mexico, 2006, pp. 399-407.
  4. B. Cashell, W. D. Jackson, M. Jickling, and B. Webel, Congressional Research Service, The Library of Congress, Washington, DC, "CRS Report for Congress RL32331: The Economic Impact of Cyber-attacks," 2004.
  5. S. Weber, P. A. Karger, and A. Paradkar, "A Software Flaw Taxonomy: Aiming Tools at Security," ACM SIGSOFT Software Engineering Notes: Software Engineering for Secure Systems (SESS) - Building Trustworthy Applications vol. 30, 4, pp. 1-7, 2005.
  6. N. Weaver, V. Paxson, S. Staniford, and R. Cunningham, "A Taxonomy of Computer Worms," in ACM Workshop on Rapid Malcode Washington, DC, USA: ACM Press, 2003, pp. 11-18.
  7. C. E. Landwehr, A. R. Bull, J. P. McDermott, and W. S. Choi, "A Taxonomy of Computer Program Security Flaws," ACM Computing Surveys (CSUR), vol. 26, 3, pp. 211-254, 1994.
  8. D. Dagon, G. Gu, C. P. Lee, and W. Lee, "A Taxonomy of Botnet Structures," in 23rd Annual Computer Security Applications Conference (ACSAC) Miami Beach, FL, USA: IEEE Computer Society, 2007, pp. 325- 339.
  9. T. F. Stafford and A. Urbaczewski, "Spyware: The Ghost in the Machine," Communications of the Association for Information Systems, vol. 14, pp. 291-306, 2004.
  10. E. Cooke, F. Jahanian, and D. McPherson, "The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets," in USENIX Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI '05) Cambridge, MA, USA: USENIX Association, 2005, pp. 39–44.
  11. H. Vegge, F. M. Halvorsen, R. W. Nergard, M. G. Jaatun, and J. Jensen, "Where Only Fools Dare to Tread: An Empirical Study on the Prevalence of Zero-Day Malware," in 4th International Conference on Internet Monitoring and Protection (ICIMP 2009) Venice/Mestre, Italy: IEEE Computer Society, 2009.
Index Terms

Computer Science
Information Sciences

Keywords

Communication path Sandbox techniques Heterogeneous Network services