CFP last date
20 December 2024
Reseach Article

Proposing Operational Technology Based Procedure (OTBP) using Round Robin Scheduling Algorithm (RRSA)

by R.k. Seth, Rimmy, Shubham Chuchra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 118 - Number 19
Year of Publication: 2015
Authors: R.k. Seth, Rimmy, Shubham Chuchra
10.5120/20852-3365

R.k. Seth, Rimmy, Shubham Chuchra . Proposing Operational Technology Based Procedure (OTBP) using Round Robin Scheduling Algorithm (RRSA). International Journal of Computer Applications. 118, 19 ( May 2015), 14-20. DOI=10.5120/20852-3365

@article{ 10.5120/20852-3365,
author = { R.k. Seth, Rimmy, Shubham Chuchra },
title = { Proposing Operational Technology Based Procedure (OTBP) using Round Robin Scheduling Algorithm (RRSA) },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 118 },
number = { 19 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 14-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume118/number19/20852-3365/ },
doi = { 10.5120/20852-3365 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:02:08.708932+05:30
%A R.k. Seth
%A Rimmy
%A Shubham Chuchra
%T Proposing Operational Technology Based Procedure (OTBP) using Round Robin Scheduling Algorithm (RRSA)
%J International Journal of Computer Applications
%@ 0975-8887
%V 118
%N 19
%P 14-20
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper presents a review along with the analysis of different types of cyber hacking attacks and proposes a new methodology for reducing the attacks during client-server communication by providing a secure channel. The designed methodology is termed as an "OTBP-Using RRSA" (Operational Technology Based Procedure-using Round Robin Scheduling Algorithm) and its working is based on the time of request entered on the search engine during client-server communication. It may help to provide security by automatic path encryption during request movement towards web server by following auto-generated unique hash address approach. The paper also discusses two different types of path hacking; viz. on-path hacking and off-path hacking by following different mechanisms such as path based authorization; path based traversing and path based access rules etc.

References
  1. GurpreetK. Juneja, 2013. Ethical hacking: A Technique to enhance information security, International journal of innovative research in science engg and technology.
  2. Kumar utkarsh, Dec-2013. System security & ethical hacking, International journal of research in engg and advanced technology.
  3. White Papers: www. insecure. in/papers. asp.
  4. Moore, Robert, 2006. Cybercrime: Investigating high technology computer crime (is ted. ). Cincinnati, Ohio: Anderson publishing.
  5. Wilhelm, Douglas, 2nd Professional Penetration testing syngress press. P. 503. ISBN 978-1-59749-425-0.
  6. K. Balachoedappa, S. Subbalakshmi & P. N. V. S. Pavankumar, 2014. Ethical hacking techniques with penetration testing, International journal of computer science and information technologies.
  7. Mathieu Rehard, 2012. Practical IOS applications hacking, France.
  8. Ammar Yassur & Smitha Nayak, 2012. Cyber Crime: A thread to the network security, International journal of computer science and network security.
  9. Dr R. L Dave&sanjaymaheshwari, Challenges and prospects of ethical hacking, Indore, Madhya Pradesh.
  10. Thomas J. holt, Deborachstrumsky, June-2012. Examining the social networks of malware writers & hackers, International journal of cyber criminology.
  11. Mihir Gandhi &jwalantbaria, 2013. SQL injection attacks in web applications, International journal of soft computing and engg.
  12. Farhoodnorouzizadehdezfoli, Alidehghantanha&Ramlan Mahmoud, 2013. Digital forensic Trendz&future, International journal of cyber security and digital forensic: The society of digital information and wireless communication.
  13. underurhat. Com/hacking/tutorials/introduction-to-hacking-techniques/.
  14. Hash-address: en. wikipedia. org/wiki/Hash-address.
  15. Identity Management and Access Governance Solutions -http://hitachi-id. com/.
  16. Phishing in banks, Images: https://www. google. co. in.
  17. Images for off path hacking: https://www. google. co. in.
Index Terms

Computer Science
Information Sciences

Keywords

Hash address encryption hacking techniques round robin scheduling algorithm.