Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Identity Recognition in Network Security Using Laser Pumer Technology and Fingerprint


Affiliations
1 M. Kumarasamy College of Engineering, Karur, Tamil Nadu, India
     

   Subscribe/Renew Journal


This research work focuses on the cyber crime for the illegal activities which is potentially large. To save the information the Laser Pumer technology is used. By using this involves the scanning process more than one for various eye patterns and fingerprint, permission can be given for access after recognition and restrict the access from intruders. The sensor device reads the fingerprints at any angle and it does not require power supply. The USB Port capability makes it truly plug-and-play and makes an easy access.

Keywords

Cyber Crime, Finger Print, Laser Pumer.
User
Subscription Login to verify subscription
Notifications
Font Size

  • G. Aaron, K. A. Bostik, E. Chung, and R. Rusmussen, “Protecting the web: Phishing, malware, and other security threats,” Proceeding of the 17th International Conference on World Wide Web 2008, WWW’08, Beijing, China, pp. 1253-1254, 2008.
  • I. I. Amit, “The attack almanac,” Engineering and Technology, vol. 4 , no. 1, pp. 68-69, 2009.
  • Z. Anwar, M. Montanari, A. Gutierrez, and R. H. Campbell, “Budget constrained optimal security hardening of control networks for critical cyber-infrastructures,” International Journal of Critical Infrastructure Protection, vol. 2, no. 1-2, pp. 13-25, 2009.
  • Y. Ben-Itzhak, “Organised cybercrime and payment cards,” Card Technology Today, vol. 21, no. 2, pp. 10-11, 2009.
  • J. S. Bhatia, R. Sehgal, B. Bhushan, and H. Kaur, “Multilayer cyber attack detection through honeynet,” Proceedings of New Technologies, Mobility and Security Conference and Workshops, NTMS’08, 5-7 November 2008.
  • C. J. Blakeley, “Cybercrime law: International best practices,” Doha Information Security Conference, Doha, Qatar, 10-11 June 2008.
  • D. M. Downs, I. Ademaj, and A. M. Schuck, “Internet security: Who is leaving the ‘virtual door’ open and why?,” First Monday, vol. 14, no. 1-5, 2009.
  • D. Dwyer, “Chinese cyber-attack tools continue to evolve,” Network Security, vol. 2009, no. 4, pp. 9-11, 2009.
  • N. Gilman, “Hacking goes pro,” Engineering and Technology, vol. 4, no. 3, pp. 26-29, 2009.
  • A. Jenik, “Cyberwar in Estonia and the Middle East,” Network Security, vol. 2009, no. 4, pp. 4-6, 2009.
  • J.-S. Kim, D.-G. Kim, and B.-N. Noh, “A fuzzy logic based expert system as a network forensics,” Proceedings of the 2004 IEEE International Conference on Fuzzy Systems, vol. 2, pp. 879-884, 25-29 July 2004.
  • T. F. Lunt, A. Tamaru, F. Gilham, R. Jagannathan, P. Neumann, and C. Jalali, “IDES: A progress report,” Proceedings of the 6th Annual Computer Security Applications Conference, 1990.
  • S. F. Owens, and R. R. Levary, “An adaptive expert system approach for intrusion detection,” International Journal of Security and Networks, vol. 1, no. 3-4, pp. 206-217, 2006.
  • A. Peiravi, and M. J. Rahimzadeh, “A novel scalable and storage-efficient architecture for high speed exact string matching,” ETRI Journal, vol. 31, no. 5, pp. 545-553, 2009.
  • M. Qi, Y. Wang, and R. Xu, “Fighting cybercrime: Legislation in China,” International Journal of Electronic Security and Digital Forensics, vol. 2, no. 2, pp. 219-227, 2009.
  • G. Rasche, E. Allwein, M. Moore, and B. Abbott, “Model-based cyber security,” Proceedings of the 14th Annual IEEE International Conference and Workshops on the Engineering of Computer Based Systems, ECBS’07, pp. 405-412, 26-29 March 2007.
  • B. Rodrigues, “The cyber-crime threat to online transactions,” Network Security, vol. 2009, no. 5, pp. 7-8, 2009.
  • A. Yassir, and S. Nayak, “Cybercrime: A threat to network security,” International Journal of Computer Science and Network Security, vol. 12, no. 2, February 2012.
  • A. Peiravi, and M. Peiravi, “Internet security - cyber crime paradox,” Journal of American Science, vol. 6, no. 1, pp. 15-24, 2010.
  • S. Yadav, T. Shree, and Y. Arora, “Cyber crime and security,” International Journal of Scientific and Engineering Research, vol. 4, no. 8, pp. 856-861, August 2013.
  • R. Moore, Cybercrime: Investigating High-Technology Computer Crime, Cleveland, Mississippi: Anderson Publishing, 2005.
  • S. W. Brenner, Cybercrime: Criminal Threats from Cyberspace, ABC-CLIO, 2010.

Abstract Views: 289

PDF Views: 7




  • Identity Recognition in Network Security Using Laser Pumer Technology and Fingerprint

Abstract Views: 289  |  PDF Views: 7

Authors

S. Meena
M. Kumarasamy College of Engineering, Karur, Tamil Nadu, India
M. Madhura
M. Kumarasamy College of Engineering, Karur, Tamil Nadu, India
S. Girja
M. Kumarasamy College of Engineering, Karur, Tamil Nadu, India

Abstract


This research work focuses on the cyber crime for the illegal activities which is potentially large. To save the information the Laser Pumer technology is used. By using this involves the scanning process more than one for various eye patterns and fingerprint, permission can be given for access after recognition and restrict the access from intruders. The sensor device reads the fingerprints at any angle and it does not require power supply. The USB Port capability makes it truly plug-and-play and makes an easy access.

Keywords


Cyber Crime, Finger Print, Laser Pumer.

References