ISSN Approved Journal No: 2320-2882 | Impact factor: 7.97 | ESTD Year: 2013
Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)
IJCRT Journal front page | IJCRT Journal Back Page |
Paper Title: AI IN EDUCATION: PERSONALIZED LEARNING AND ADAPTIVE ASSESSMENT
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02125
Register Paper ID - 259907
Title: AI IN EDUCATION: PERSONALIZED LEARNING AND ADAPTIVE ASSESSMENT
Author Name(s): Dr. Balaji K, Biswajit Nayak, Kavita Soren, Arpita Kumari, Madhushree R
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 824-829
Year: May 2024
Downloads: 79
We examine the revolutionary effects of artificial intelligence (AI) on education in this thorough investigation, paying particular attention to the critical ideas of personalized learning and adaptive assessment. The research explains how education has changed historically. AI's integration into educational paradigms emphasizes how crucial it is to provide learners with learning experiences that are specifically personalized to them. It also explores the field of AI-powered adaptive assessment, explaining how it differs from traditional testing methods. The paper provides a comprehensive overview of this educational revolution by synthesizing case studies, existing literature, and developing trends.
Licence: creative commons attribution 4.0
AI IN EDUCATION: PERSONALIZED LEARNING AND ADAPTIVE ASSESSMENT
Paper Title: IMPLEMENTATION OF THE AES ENCRYPTION ALGORITHM 256 BITS IN CRYPTOGRAPHY
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02124
Register Paper ID - 259906
Title: IMPLEMENTATION OF THE AES ENCRYPTION ALGORITHM 256 BITS IN CRYPTOGRAPHY
Author Name(s): Dr. Balaji k, Mohammed Tauqir Ali T.M, Satyajit Mohanty, N.V. Rakesh, Viswa .M
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 820-823
Year: May 2024
Downloads: 97
In today's corporate world, network and data security is a major concern. Many different types of businesses, such as financial institutions, law firms, schools, healthcare, telecommunications, mining, and government organizations, have a strong demand for strategic data management techniques. Businesses lose sensitive data, such as biometric and financial information, to competitors and other parties as a result of hackers' activity. Businesses are losing millions of dollars as a result of malicious people gaining access to unprotected data. Businesses now place a great value on data security. Protection is required to guarantee information security. Using encryption algorithms to protect communications in these kinds of threads is one of the most important and practical solutions available. Performance and security are two factors that the developer must take into account while creating an extremely secure Android application. Android-based applications must perform better because Android smartphones have constrained resources. The most widely used secure encryption algorithms Rijndael, Serpent, and Two fish will be evaluated in this study to see which works best in order to overcome the issues.
Licence: creative commons attribution 4.0
telecommunications, android, encryption algorithms
Paper Title: BIOMETRICS USING PYTHON
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02123
Register Paper ID - 259903
Title: BIOMETRICS USING PYTHON
Author Name(s): Dr. K Balaji, AnushreeGD, BhavanaShreeS, BhuvanaShreeBS, KavyaBN
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 815-819
Year: May 2024
Downloads: 82
Biometric authentication systems have gained significant attention due to their ability to provide secure and convenient access control. This project proposes a novel approach to biometric authentication using Python, leveraging machine learning techniques and computer vision algorithms. The system integrates facial recognition, fingerprint recognition, and voice recognition modalities to enhance authentication accuracy and robustness. The system begins by capturing biometric data from users through respective sensors(camera, fingerprint scanner, microphone). Preprocessing techniques are applied to clean and normalize the data, followed by feature extraction to extract unique biometric features. Machine learning models, such as Convolution Neural Networks (CNNs) and Support Vector Machines (SVMs), are trained on the extracted features to learn the patterns specific to each user. During the authentication phase, the system compares the input biometric data with the stored templates using appropriate similarity metrics. Fusion techniques are employed to combine the results from multiple modalities, enhancing the overall authentication accuracy and reliability. Keywords-recognition, authentication, security.
Licence: creative commons attribution 4.0
Paper Title: EMAIL AUTHENTICATION USING CRYPTOGRAPHY
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02122
Register Paper ID - 259901
Title: EMAIL AUTHENTICATION USING CRYPTOGRAPHY
Author Name(s): Dr. Balaji K, Ashwini P, Likhitha P, Jagadevi, Gnanapriya
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 809-814
Year: May 2024
Downloads: 63
Setting up an email account involves confirming ownership through a link sent to the provided email address. Personal questions, like favorite colors or pets' names, may also be asked for added security. Email services monitor login locations and usage patterns to detect suspicious activity. Two-factor authentication adds an extra layer of security by sending a code to the user's phone. Account recovery processes often include sending a reset link to an alternate email or mobile number. During email sessions, encryption and session management techniques are used to protect user data. Automatic logout may occur after a period of inactivity to prevent unauthorized access. These measures collectively ensure email account security and user verification.
Licence: creative commons attribution 4.0
EMAIL AUTHENTICATION USING CRYPTOGRAPHY
Paper Title: BRAIN COMPUTER INTERFACE UNDER AI
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02121
Register Paper ID - 259900
Title: BRAIN COMPUTER INTERFACE UNDER AI
Author Name(s): DR. Balaji K, P Srikanth, Tharun Reddy J, Mahesh Naik, R Bali Bai ,Nithin Kumar S M
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 804-808
Year: May 2024
Downloads: 83
A brain-machine interface, also referred to as BCIs, is a type of technology that enables people to interact with technology through their brain. It allows them to bypass the need for physical controls by connecting their brain activity to external devices. These systems are able to interpret brain signals and translate them into commands for various devices, such as computers and robotic arms.
Licence: creative commons attribution 4.0
BRAIN COMPUTER INTERFACE UNDER AI
Published Paper ID: - IJCRTAB02120
Register Paper ID - 259899
Title: BIG DATA
Author Name(s): DR. Balaji, Pallavi K G, Meghana U, Shwetha S, Manasa N
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 801-803
Year: May 2024
Downloads: 77
Big Data is a term used to describe large and complex datasets that require powerful computing tools and analytics methods to extract meaningful insights. The rapid growth of data in the modern era has led to an explosion of Big Data sources including social media, sensor data, email logs, and more. This report provides a comprehensive over view of Big Data, including its definition, its characteristics, its sources, and its applications. We need big data when the user has large amount of data, it has noisy and inconsistency. Traditional data storage cannot able of handling large volume of data hence we need a big data analytic. In big data the data can be Structured type, Unstructured type and semi structured type. Big data has characteristics and it is also called as 5V's. We discuss the challenges posed by Big Data, including storage, retrieval, and analysis, and we describe several tools and technologies used to address these challenges.
Licence: creative commons attribution 4.0
Paper Title: DISEASE PREDICTION USING DATA MINING
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02119
Register Paper ID - 259897
Title: DISEASE PREDICTION USING DATA MINING
Author Name(s): DR.BALAJI.K, MONISHA P, MADHUSHREE S G, MOHAN KUMAR, SAMRAT RAJ
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 796-800
Year: May 2024
Downloads: 87
Data mining is described as sifting via very huge amount of records for beneficial information. Some of the vital and famous records mining techniques are classification, clustering, prediction. Data mining methods are used for range of applications. In health care industry, data mining plays an necessary position for predicting diseases. For detecting a sickness number of exams should be required from the patient. But the use of data mining method the wide variety of check be reduced. This reduced check plays an important position in time and performance. This method has an benefits and disadvantages. This paper analyzes how data mining techniques are used for predicting one of kind sorts of diseases. This paper reviewed the research papers which mainly targeted on predicting heart disease, Diabetes, breast cancer.
Licence: creative commons attribution 4.0
DISEASE PREDICTION USING DATA MINING
Paper Title: CONNECTED WORLD: THE IMPACT OF IOT ON OUR LIVES
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02118
Register Paper ID - 259896
Title: CONNECTED WORLD: THE IMPACT OF IOT ON OUR LIVES
Author Name(s): Dr Balaji K, Kruthi P.J, Lekha V.S, Harshitha V, Keerthana E
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 792-795
Year: May 2024
Downloads: 77
In today's digital age, the concept of a connected world has transformed the way we interact, communicate, and conduct business. This paper explores the intricate web of connectivity that defines our modern society. From social media platforms to the Internet of Things, this presentation delves into the impact of interconnected technologies on individuals, businesses, and societies globally. Through an in-depth analysis of the benefits, challenges, and future implications of this connected world, we aim to shed light on the opportunities and risks associated with our increasingly interconnected digital landscape. Join us as we navigate through the complexities of the connected world and uncover the potential it holds for shaping our future. The advent of the connected world has ushered in a new era of technological innovation and societal transformation. This paper delves into the myriad opportunities and challenges presented by the interconnectedness facilitated by the digital landscape. It explores the implications of connectivity across various domains including communication, commerce, healthcare, education, and governance. From the proliferation of IoT devices to the rise of artificial intelligence, the paper examines how these advancements are reshaping industries, redefining human interactions, and influencing global dynamics. Additionally, it addresses the ethical, privacy, and security concerns arising from the unprecedented level of connectivity. Through a comprehensive analysis, this paper aims to provide insights into navigating the complexities of the connected world and harnessing its potential for the betterment of society.
Licence: creative commons attribution 4.0
CONNECTED WORLD: THE IMPACT OF IOT ON OUR LIVES
Paper Title: DIGITAL FORENSIC
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02117
Register Paper ID - 259894
Title: DIGITAL FORENSIC
Author Name(s): Dr Balaji K, Rahul P, Naveen Kumar, Sharath U, Nandeep
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 788-791
Year: May 2024
Downloads: 102
Crimes committed in electronic or digital spaces, particularly within cyberspace, have become widespread. Criminals utilize technology to carry out their unlawful activities, presenting novel challenges for law enforcement agents, legal practitioners, military personnel, and security specialists. Digital forensics has assumed a critical role in detecting and resolving crimes involving computers and digital assistance. This paper presents a brief overview of digital forensics, offering an introduction to its importance in tackling modern criminal activities.
Licence: creative commons attribution 4.0
Published Paper ID: - IJCRTAB02116
Register Paper ID - 259891
Title: ECTOLIFE
Author Name(s): Dr Balaji K, Lavanya V, Chandana M, Chethan kumar H V, Arpitha J K
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 783-787
Year: May 2024
Downloads: 105
EctoLife the world's first artificial womb facility. This concept was designed by biotechnologist Hashem AI-Ghaili, the artificial womb facility is powered by renewable energy.EctoLife is designed to help countries that are suffering from low populations. Ectolife introduces a dynamic fusion of virtual reality (VR), augmented reality (AR), and mixed reality (MR) technologies into our everyday existence. This abstract concept aims to seamlessly integrate digital elements into our physical world, revolutionizing how we interact, learn, work, and entertain. Through ectolife, individuals immerse themselves in virtual environments, interact with digital objects, and engage with virtual entities as if they were part of their physical surroundings. This integration of virtual and real experiences redefines traditional boundaries, offering new avenues for communication, collaboration, and creativity. Beyond personal experiences, ectolife extends its impact across various sectors, including healthcare, gaming, education, and architecture. VR-assisted therapies improve patient rehabilitation, AR gaming enhances interactive entertainment, and MR facilitates real-time design prototyping in architecture.However, as ectolife evolves, it brings forth ethical, social, and existential considerations. Privacy concerns, data security issues, and the potential for over-reliance on virtual experiences raise important questions. Furthermore, the blurring of virtual and physical realities prompts reflection on identity, agency, and the nature of existence. Inconclusion, ectolife signifies a transformative shift, offering exciting possibilities while posing challenges. Embracing ectolife requires a balanced approach that harnesses its potential while addressing associated risks. As ectolife continues to unfold, it promises to reshape human experiences and advance society in unprecedented ways.
Licence: creative commons attribution 4.0
Paper Title: Website Blocker Using Python
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02115
Register Paper ID - 259888
Title: WEBSITE BLOCKER USING PYTHON
Author Name(s): DR.BALAJI K
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 778-782
Year: May 2024
Downloads: 84
According to the Google Search Statistics, Google processes more than 3.7 billion searches every day, with an average of 40000 searches per second. This illustrates our extreme dependency on the internet for all our daily tasks ranging from complex projects on space science to simplest queries like what is the right way to greet a person in the evening. Our searches are answered through interlinked web pages, known as websites. As of September 2022, there are over 1.98 billion websites available online. Apart from the benefits of having access to huge content and numerous resources on our fingertips, it can also be a great source of distraction and mismanagement of time. Constant online presence of an individual may affect an individual's ability of achieving professional and personal goals. Hence, website blocker is one effective tool that helps an individual take a conscious call on blocking a website. There may be many reasons for blocking a website, which will be discussed in the following sections of the paper. A website blocker, if effectively utilized, can enhance focus, productivity and value of time of an individual and the organization as well. Here, we propose a simple website blocker implementation in Python.
Licence: creative commons attribution 4.0
Website Blocker Using Python
Paper Title: An Introduction to Artificial Intelligence Tools in Various Domains
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02114
Register Paper ID - 259887
Title: AN INTRODUCTION TO ARTIFICIAL INTELLIGENCE TOOLS IN VARIOUS DOMAINS
Author Name(s): Dr Balaji K, Naveena kumara K S, Naveen H S, Yashavanth achar, Raghunandan P
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 770-777
Year: May 2024
Downloads: 98
This research paper introduces Artificial Intelligence tools and uses of the same in various domains. The importance of Artificial Intelligence in enhancing the efficiency and automation to solve complex problems is discussed, along with the various types of artificial intelligence tools available. The paper also covers the use of artificial intelligence in AI in Cyber security, AI in Education, AI in Agriculture, AI in Education, AI Smart cities, AI in Environmental conservation, AI in Sport Analytics. The paper concludes with a summary of the key takeaways and the potential impact of artificial intelligence tools in various domains. The paper aims to provide a comprehensive overview of artificial intelligence tools and to highlight their importance in various fields to develop new approaches in solving complex problems.
Licence: creative commons attribution 4.0
An Introduction to Artificial Intelligence Tools in Various Domains
Paper Title: Cybersecurity using Python
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02113
Register Paper ID - 259885
Title: CYBERSECURITY USING PYTHON
Author Name(s): Dr.Balaji K, M Shireesha, Aishwarya S, Kavya Shree K V, Gagana Shree M
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 765-769
Year: May 2024
Downloads: 81
Cybersecurity is known for defending computers, servers, mobile device, electronic system, networks and data from malicious (misusing the insured computer systems). Python has emerged as a versatile and powerful tool in the field of cybersecurity, python is known for versatility offering a wide range of libraries and frameworks for various security task.This abstract involves into the application of python in cybersecurity, focusing on its role in penetration testing, network security, and malware analysis. Python effectiveness in network traffic analysis, intrusion(An Intrusion Detection System (IDS) maintains network traffic looks for unusual activity and alerts when it occurs), log analysis (Log analysis is the process of reviewing, interpreting and understanding computer-generated records called logs.) Enabling security professionals to monitor and defend against malicious activities (misuse of system resources) effectively
Licence: creative commons attribution 4.0
Cybersecurity using Python
Paper Title: Artificial Intelligence in Healthcare
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02112
Register Paper ID - 259884
Title: ARTIFICIAL INTELLIGENCE IN HEALTHCARE
Author Name(s): Dr.Balaji K, A Ravi Kumar Reddy, Jagan Mohan, Yashwanth Kumar Sai, Nanda
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 759-764
Year: May 2024
Downloads: 77
Goal of this systematic search is to offer an description of artificial intelligence's role in healthcare. Artificial intelligence has played a crucial influence in healthcare. A paradigm change in healthcare has take place due to increasing availability of healthcare data and rapid progress of analytics technology. Machine learning technologies such as assist vector machine, deep learning neural networks, and natural language processing manage structured data. Unstructured data is processed using natural language processing.
Licence: creative commons attribution 4.0
Artificial Intelligence in Healthcare
Paper Title: NATURAL LANGUAGE PROCESSING IN ARTIFICIAL INTELLIGENCE
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02111
Register Paper ID - 259881
Title: NATURAL LANGUAGE PROCESSING IN ARTIFICIAL INTELLIGENCE
Author Name(s): Dr. Balaji K, Mr. Samir Raza, Mr. Ratan J
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 754-758
Year: May 2024
Downloads: 93
Natural Language Processing (NLP) is the study of how computers and human languages interact is the focus of the artificial intelligence (AI) field of natural language processing, or NLP. It encompasses a range of techniques and strategies intended to give robots the capacity to understand, interpret, and generate natural language in a way that is beneficial and appropriate for a number of applications. Natural language processing (NLP) has evolved tremendously in recent years thanks to the availability of large datasets, powerful computer power, and sophisticated machine learning models. Natural language, or spoken and written human communication, is extremely difficult because of its complexity, context-dependence, and intrinsic ambiguity. By creating models and algorithms that are capable of analyzing and interpreting natural language data, natural language processing (NLP) aims to close the understanding gap between human language and computers. NLP's main objective is to provide computers the ability to do language-related activities including comprehending text, coming up with logical answers, extracting data, and communicating between languages. To accomplish these goals, NLP incorporates concepts from multiple academic fields, including as statistics, computational science, machine learning, and linguistics.
Licence: creative commons attribution 4.0
NATURAL LANGUAGE PROCESSING IN ARTIFICIAL INTELLIGENCE
Paper Title: NEURAL NETWORK
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02110
Register Paper ID - 259880
Title: NEURAL NETWORK
Author Name(s): Dr.Balaji K, Vinil Monteiro, Tarun G, Tarun Kulakarni, Santosh Maddi, Syed Kaif
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 750-753
Year: May 2024
Downloads: 64
Neural networks, also known as artificial neural networks (ANNs) or simply neural networks, are a subset of machine learning that form the foundation of deep learning techniques. Which was inspired by the structure and function of the human brain, mimicking the way real neurons communicate. ANNs are composed of many interconnected basic processors, functioning in parallel. This paper explores artificial neural networks and their basic types, outlining the fundamental neuron and the artificial computer model. It discusses network structures, learning methods, and some of the most commonly used ANNs..
Licence: creative commons attribution 4.0
Paper Title: NAVIGATING THE WORLD OF GRAPHS: NOVEL APPLICATIONS OF BFS AND DFS ALGORTHIMS
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02109
Register Paper ID - 259878
Title: NAVIGATING THE WORLD OF GRAPHS: NOVEL APPLICATIONS OF BFS AND DFS ALGORTHIMS
Author Name(s): DR.BALAJI, Madhu suharika, Gouri Rangabhatt Joshi, Jameema Joy.S, Aishwarya S
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 743-749
Year: May 2024
Downloads: 74
The project aims to implement two popular searching algorithms that is Depth-First-Search (DFS) and the Breadth-First-Search (BFS) in a web-based application using JSP and Spring Tool Suite. The user is presented with a form where they can input the starting and ending nodes, as well as choose between the BFS and DFS algorithms. When the user submits the form, a Java file takes the form data and saves it to another JSP file called register. If the selected algorithm is DFS, the Java code for DFS is executed, and likewise for BFS. While the code is running, the user is shown a progress indicator to let them know that the algorithm is processing. Once the algorithm has finished running, the user is directed to a results page where they can view the nodes explored and the path found. The results are displayed in an easy-to-read format, such as a table or list. The project also handles errors, such as when the user inputs a non-existent node, and alerts the user if no path was found. Overall, this project offers a convenient and user-friendly way for users to explore and search graphs using BFS and DFS algorithms. It showcases the use of JSP, Spring Tool Suite, and Java to create a web-based application that can handle complex data structures and algorithms
Licence: creative commons attribution 4.0
Paper Title: Plagiarism Checker and Classification of Files on Cloud Using Smart Cloud
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02108
Register Paper ID - 259877
Title: PLAGIARISM CHECKER AND CLASSIFICATION OF FILES ON CLOUD USING SMART CLOUD
Author Name(s): Dr.Balaji K, Divya .M, Krupa.B, Gouri.G, Arpita.P
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 739-742
Year: May 2024
Downloads: 82
This study suggests a method to address the cloud duplication problem. The restricted amount of data storage that these service providers can offer is only partially utilized by the abundance of redundant and useless data on the internet. Inadequate cloud efficiency might result in far greater costs for service providers than anticipated. The fact that the data is kept on a server that may be located kilometres distant from the user presents another problem. This raises the price and efficiency even further. A smart cloud can assist with resolving these problems. By calculating the ratio between the proportions of two vectors, we can assign a categorization rating to the document.
Licence: creative commons attribution 4.0
Plagiarism Checker and Classification of Files on Cloud Using Smart Cloud
Paper Title: ROBOTIC EVOLUTION IN MACHINE LEARNING
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02107
Register Paper ID - 259875
Title: ROBOTIC EVOLUTION IN MACHINE LEARNING
Author Name(s): Dr.Balaji K, Inav Sultan, Subhalaxmi Dora, Harish S J, Harshith S
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 734-738
Year: May 2024
Downloads: 77
The integration of robotics and machine learning has revolutionized the field of automation, enabling robots to perform complex tasks with unprecedented levels of autonomy and adaptability. This paper provides an in-depth exploration of the evolution of robotics in machine learning, tracing its historical development, current state, and future trends. We begin by examining the early developments in robotics, highlighting the limitations of pre-programmed robots and the need for more adaptive and intelligent systems. We then discuss the emergence of machine learning algorithms and their integration into robotic systems, leading to the development of robots capable of learning from data and improving their performance over time. The paper also explores the current state of robotics in machine learning, focusing on key technologies such as deep learning, reinforcement learning, and computer vision. We discuss how these technologies are being used to enhance robotic capabilities in various domains, including manufacturing, healthcare, and autonomous vehicles. Challenges and opportunities in integrating machine learning with robotics are also addressed. Technical challenges, such as the need for robust and efficient algorithms, as well as ethical and social implications, such as the impact of intelligent robots on the workforce, are discussed.
Licence: creative commons attribution 4.0
ROBOTIC EVOLUTION IN MACHINE LEARNING
Paper Title: Prevention of Vulnerable Virtual Machines against DDOS Attacks in the Cloud
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02106
Register Paper ID - 259873
Title: PREVENTION OF VULNERABLE VIRTUAL MACHINES AGAINST DDOS ATTACKS IN THE CLOUD
Author Name(s): Dr.Balaji K, Tanushree M, Pavan Kalyan, Manik Rahul, Rohit
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 729-733
Year: May 2024
Downloads: 90
One of the biggest issues that has drawn a lot of research and development attention in recent years is cloud security. Notably, assailants will investigate exploits in a cloud system and infiltrate virtual machines to release more extensive Distributed Denial-of-Service attacks (DDoS). Early-stage tactics including multi-step exploitation, low-frequency vulnerability scanning, and turning found susceptible virtual machines into zombies are sometimes used in DDoS assaults. Finally, DDoS attacks are launched using the zombies that have been infected. When it comes to cloud systems, especially Infrastructure-as-a-Service (IaaS) clouds, zombie exploration attack detection is truly problematic. This might occur from cloud customers installing susceptible software on their virtual computers.
Licence: creative commons attribution 4.0
Attack graph model, NICE, distributed denial of service attack, cloud security, and cloud attacks
The International Journal of Creative Research Thoughts (IJCRT) aims to explore advances in research pertaining to applied, theoretical and experimental Technological studies. The goal is to promote scientific information interchange between researchers, developers, engineers, students, and practitioners working in and around the world.
Indexing In Google Scholar, ResearcherID Thomson Reuters, Mendeley : reference manager, Academia.edu, arXiv.org, Research Gate, CiteSeerX, DocStoc, ISSUU, Scribd, and many more International Journal of Creative Research Thoughts (IJCRT) ISSN: 2320-2882 | Impact Factor: 7.97 | 7.97 impact factor and ISSN Approved. Provide DOI and Hard copy of Certificate. Low Open Access Processing Charges. 1500 INR for Indian author & 55$ for foreign International author. Call For Paper (Volume 12 | Issue 7 | Month- July 2024)