Visible to the public Security threat identification using energy points

TitleSecurity threat identification using energy points
Publication TypeConference Paper
Year of Publication2017
AuthorsRodrigues, P., Sreedharan, S., Basha, S. A., Mahesh, P. S.
Conference Name2017 2nd International Conference on Anti-Cyber Crimes (ICACC)
Date Publishedmar
KeywordsCentral Processing Unit, compositionality, Computer crime, Computers, cosmic Method, DoS attack, energy based denial of service attacks, energy consumption, energy points, Metrics, power aware computing, Power demand, pubcrawl, Resiliency, Scientific Computing Security, SDLC, security breaches, security mechanisms, security of data, security process, security threat identification, Software, software development lifecycle, software engineering
Abstract

This research paper identifies security issues; especially energy based security attacks and enhances security of the system. It is very essential to consider Security of the system to be developed in the initial Phases of the software Cycle of Software Development (SDLC) as many billions of bucks are drained owing to security flaws in software caused due to improper or no security process. Security breaches that occur on software system are in umpteen numbers. Scientific Literature propose many solutions to overcome security issues, all security mechanisms are reactive in nature. In this paper new security solution is proposed that is proactive in nature especially for energy based denial of service attacks which is frequent in the recent past. Proposed solution is based on energy consumption by system known as energy points.

DOI10.1109/Anti-Cybercrime.2017.7905262
Citation Keyrodrigues_security_2017