Security threat identification using energy points
Title | Security threat identification using energy points |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Rodrigues, P., Sreedharan, S., Basha, S. A., Mahesh, P. S. |
Conference Name | 2017 2nd International Conference on Anti-Cyber Crimes (ICACC) |
Date Published | mar |
Keywords | Central Processing Unit, compositionality, Computer crime, Computers, cosmic Method, DoS attack, energy based denial of service attacks, energy consumption, energy points, Metrics, power aware computing, Power demand, pubcrawl, Resiliency, Scientific Computing Security, SDLC, security breaches, security mechanisms, security of data, security process, security threat identification, Software, software development lifecycle, software engineering |
Abstract | This research paper identifies security issues; especially energy based security attacks and enhances security of the system. It is very essential to consider Security of the system to be developed in the initial Phases of the software Cycle of Software Development (SDLC) as many billions of bucks are drained owing to security flaws in software caused due to improper or no security process. Security breaches that occur on software system are in umpteen numbers. Scientific Literature propose many solutions to overcome security issues, all security mechanisms are reactive in nature. In this paper new security solution is proposed that is proactive in nature especially for energy based denial of service attacks which is frequent in the recent past. Proposed solution is based on energy consumption by system known as energy points. |
DOI | 10.1109/Anti-Cybercrime.2017.7905262 |
Citation Key | rodrigues_security_2017 |
- pubcrawl
- software engineering
- software development lifecycle
- Software
- security threat identification
- security process
- security of data
- security mechanisms
- security breaches
- SDLC
- Scientific Computing Security
- Resiliency
- Central Processing Unit
- Power demand
- power aware computing
- Metrics
- energy points
- energy consumption
- energy based denial of service attacks
- DoS attack
- cosmic Method
- Computers
- Computer crime
- Compositionality