Abstract Proceedings of ICIRESM – 2020
Full conference PDF is available to the subscribed user. Use your subscription login to access,
DATA SPOOFING AND INTRUSION DETECTION SYSTEM AES ALGORITHM
Data spoofing and intrusion detection systems are becoming increasingly important as more and more sensitive data is stored in centralized storage devices. These systems can help to detect unauthorized requests for information, phishing attacks, and prevent access to files that do not have the proper permissions.This project proposes a data spoofing and intrusion detection system that uses the AES algorithm to store files in encrypted form in a centralized storage system. The system also uses a variety of other techniques to detect unauthorized requests, including:Data stream analysis: The system analyzes data streams to identify patterns that are indicative of unauthorized access.File access monitoring: The system monitors file access to identify attempts to access files that do not have the proper permissions.User behavior analysis: The system analyzes user behavior to identify patterns that are indicative of unauthorized access.The proposed system has been implemented and tested, and it has been shown to be effective in detecting unauthorized requests and preventing access to files that do not have the proper permissions.
data spoofing, intrusion detection system, AES algorithm, centralized storage, data stream analysis, file access monitoring, user behavior analysis
13/11/2020
175
20175
IMPORTANT DAYS
Paper Submission Last Date
September 27th, 2025
Notification of Acceptance
October 25th, 2025
Camera Ready Paper Submission & Author's Registration
November 11th, 2025
Date of Conference
November 28th, 2025