This paper is published in Volume-5, Issue-3, 2019
Area
Cyber Security
Author
Vaibhav Muthukumaran
Org/Univ
SRM Institute of Science and Technology, Chennai, Tamil Nadu, India
Pub. Date
13 May, 2019
Paper ID
V5I3-1355
Publisher
Keywords
EVI-embedded virtual intelligence, Authentication, AKE-automated kernel-level execution

Citationsacebook

IEEE
Vaibhav Muthukumaran. EVI-databse authentication using advanced security standards, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
Vaibhav Muthukumaran (2019). EVI-databse authentication using advanced security standards. International Journal of Advance Research, Ideas and Innovations in Technology, 5(3) www.IJARIIT.com.

MLA
Vaibhav Muthukumaran. "EVI-databse authentication using advanced security standards." International Journal of Advance Research, Ideas and Innovations in Technology 5.3 (2019). www.IJARIIT.com.

Abstract

The concept of embedded virtual intelligence was to enable database authentication with advanced security standards. Data is the most resourceful asset of any information system the key idea of the paper was to secure data. Evi was designed with a centric algorithm that makes database authentication or access to any other system portal very secure. The functionality of this system is intelligently based on two major security modules are IP Retrieval Module and Automated Kernel Level Execution. IP Retrieval Module is a system package which runs on the background which has a steganographic implementation that retrieves the IP address of the host as soon as false login is attempted and logs I another independent server. Automated Kernel Level Execution Module overrides the system once the IP Retrieval Module is done this system force downloads executable files that run on startup now the executable files are implemented with kernel scripts that automatically retrieves all the network and system related information and packages it to a text file and mails back the details to the desired destination email address along the credentials.All these kernel scripts inside the exe files are encrypted by AES algorithm.
Paper PDF