Browsing by Author "Lokhande, P. S."
Now showing 1 - 18 of 18
Results Per Page
Sort Options
Item Analysis and design of web personalization systems for E-Commerce(International Journal of Web Technology, 2015-12) Lokhande, P. S.; Meshram, B.B.Abstract- Web personalization facilitate customizing a web site as per users preferences by using the various data mining techniques, taking advantage of the knowledge acquired from the analysis of the user’s navigational usage data. The web personalization reduces the searching time of the user and serves the purchasing interest of the user. In this paper, we have proposed the Analysis and design of the E-Commerce Systems. On the basis of the proposed Software specification Requirements ,for analysis of the systems, we proposed the class diagram for Preprocessing Systems, Knowledge Discovery Systems and Recommendation Subsystems and then provided workflow of the systems by proposing the required functional model of the systems. In the design of the systems we proposed the data structure design and Dynamic Web Systems architecture and implemented the systems. Lastly we have shown the results of the navigational behavior of the user during particular transaction.Item Analytic Hierarchy Process (AHP) to Find Most Probable Web Attack on an E-Commerce Site(ACM: Association For Computing Machinery, 2016-03-04) Lokhande, P. S.Attackers are using various techniques to attack on an E-Commerce site; they do have various options to initiate attack. On other hand web administrators finding it difficult to prioritize the defense mechanism against each web attack. The Analytic Hierarchy Process (AHP) is an effective method in dealing with the situations where we need to select one among available alternatives or prioritize them according to their severity. Here we try to focus on some major type of attacks which are most offensively happening on the web-services; like Cross-Site Scripting Attack, DoS Attack, SQL Injection Attack and Man-in-Middle Attack. These top online web attack methods were chosen to decide the most probable happening attack on a website. The prposed methods shows step by step approach to find the most probable alternative that hackers could first use to do the attack.On the basis of this model the administrator can take care of it at first place.Item Botnet: Understanding Behavior, Life Cycle Events & Actions(International Journal of Advanced Research in Computer Science and Software Engineering, 2014-03) Lokhande, P. S.This paper examines botnet behavior and provides the basis for the development of an application tool used to investigate the properties of botnets in large-scale networks. Botnets are breaching security and data safety and are used by hackers for initiating various cyber-attacks. Botnet causes various problems such as information search and theft, denial of service attack, sending SPAM e-mail, and so on. The purpose of this paper is to study basic details of security threats that users of Internet are facing from malicious botnets. There is a need to develop effective mechanism for detecting and mitigating the malicious behavior of botnets. This study helps: (i) To understand behavior of bots and Botmaster. (ii) To study botnet topologies, behavior, lifecycle events and actions; and (iii) to study preventive steps to stop the botnet attacks. Keywords— Botnet, Bot, Botnet Maker, Botmaster, Botnet Detector, Zombie, IRC, DDoS, Spam, Internet Security, Bot Hunter, WebSecurityItem Building dynamic e-business systems architecture(International Journal for Scientific Research & Development, 2015-09) Lokhande, P. S.Web personalization is the process of customizing a web site as per user‘s preferences by using the data mining, taking advantage of the knowledge acquired from the analysis of the user‘s navigational behavior. With personalization, when a particular person visits a Website, the recommendation can be designed specifically for that person. The Dynamic E-Business website can be designed using web personalization. The proposed E-Business Web personalization model consists of preprocessing, Knowledge Discovery using data mining and recommendation engine. The proposed preprocessing algorithm consists of three subroutines, namely Cleaning non-required server log, Identification of User from IP address and Log, Creating session for every user and preparing Transaction file. The knowledge discover module consists of Aprori Algorithm for TRP association rule, Sequence Pattern Algorithm for Mining log and Access Log and ID3 Algorithm for Classification of the registered Users of the website. Depending on the Sequence pattern, association rule and user class the recommendation module recommends the desired web page link to the userItem Cloud Computing: An Architecture, its Security Issues & Attacks(International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 2013-03) Lokhande, P. S.Every day new things are added in old and those things should have to be preserve for managing the future, new things are always come with the major question that where should keep the things safely? This concept is applicable for both the regular household things as well as the computer data. Day by day storage requirements are increasing but storage space is the same for preserving the data securely. For storing extra data the computer users may invest extra cost on separate storage devices or choose the newly added feature in IT environment is ‘Cloud Computing’. Cloud computing has extended feature of the distributed computing; it is a way to increase the capacity or add capabilities without investing in new infrastructure, training new personal or licensing new software. This paper mainly focused on the architecture of cloud computing; survey of the different security issues that has emanate due to the nature of the service delivery module of cloud computing system and type of attacks in cloud computing environment. Keywords — Cloud computing, cloud security, cloud providers, cloud standards, cloud attacks, software as a service (SaaS), platform as a service (PaaS), infrastructure as a service (IaaS)Item Collecting digital evidence: Internet banking fraud - Case study(International Research Journal of Engineering and Technology (IRJET), 2015-05) Lokhande, P. S.Net banking frauds are now a day’s became common, criminals use the various available technologies to con the unaware citizens. Use of Phishing mails, key loggers and mobile phone SIM card cloning is the techniques commonly used. Highest number of Cyber Crimes made the job of police department tough. Tracing the non history shitter criminals, is an another challenge. Various online resource such as anonymizers equip criminals with loads of facilityItem College alumni portal(IJSRD - International Journal for Scientific Research & Development, 2015) Lokhande, P. S.; Shaikh, Asiya; Shaikh, Tuba; Siddiqui, Maryam; Momin, AlimuddinAbstract— Alumni portals is providing common platform for every institute. Owing to the need to have all the Alumni (already passed out students) must be connected to the Institute, resulted in sharing their experiences, views, ideas, guidance motivations and strategies. The objective of Alumni portal application is to allow old and new students of the college to have communication. This allows students to know about each other and their current activities. This portal highlights the feature of communication, which will enable the current students to have interaction with the alumni of the college for getting various updates on current industry trends, Internship opportunity, sponsored projects and various referrals opening in the corporate world. This portal will serve the cause of integrating all the stakeholders of Institute such as , Alumni, College students , Faculties to avail the guidance and knowledge sharing on various domains. In this project we proposed the Dynamic Architectural design of the Alumni portal, which enable the two way communication between all stakeholders.Item College Alumni Portal(AIKTC, 2016-05) Lokhande, P. S.; Shaikh, Asiya Haider Shahana (12CO09); Shaikh, Tuba Shahabuddin Rehmat (12CO12); Siddiqui, Maryam Shamshuddin Aziza (12CO15); Momin, Alimuddin Azizullah Sajida Khatoon (12CO47)Alumni portals is providing common platform for every institute. Owing to the need to have all the Alumni (already passed out students) must be connected to the Institute,resulted in sharing their experiences , views , ideas, guidance , motivations and strategies. The objective of Alumni portal application is to allow old and new students of the college to communicate with each other. This allows students to know about each other and their current activities. This portal highlights the feature of communication, which will enable the current students to have interaction with the alumni of the college for getting various updates on current indusrty trends, Internship opportunity, sponsored projects and various referral opening in the corporate world. This portal will serve the cause of integrating all the stakeholders of Institute such as , Alumni, College students , Faculties to avail the guidance and knowledge sharing on various domains. In this project we proposed the Dynamic Architectural design of the Alumni portal, which enable the two way communication between all stakeholders.Item Digital forensics analysis for data theft(The International Journal of Forensic Computer Science, 2015-12-27) Lokhande, P. S.; Meshram, B.B.Cyber Criminals are using various techniques to attack on computing systems. Not only the professionally Cyber Criminals but also white collar IT employees are also involved in the valuable data theft. Some of the motives behind the data theft are revenge on employer, higher pay offered by a competitor company, or selling valuable data, etc. This work gives step by step approach implemented to extract the digital evidence from the computing systems of employee by whom the data theft is made. The employee used the Windows operating systems and the data in MS word format and excel format was sent to the competitor company by email and the data was also copied from the computer to the pen drive of the employee and then it was deleted from the company’s computer. The extensive literature survey is made on Digital Forensic Analysis Process, Digital Forensic Model and various tools and hardware required for forensic set up. We have simulated the investigation process to get the evidence from the suspected employee’s computer.Item E-Commerce Applications: Vulnerabilities, Attacks and Countermeasures(International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 2013-02) Lokhande, P. S.The extensive use of e-commerce creates new ways for both image and brands to be attacked. Attackers using various gimmicks and techniques to find various loopholes in the system. While there has been good ways to identify threats, educating customers and identifying countermeasures. Attacks on customer sensitive information has the adverse effect of decreasing the consumer faith on online transactions, which happens in e-commerce. Prevention is better than cure, good knowledge and understanding of the online threats can be used as a tool to avoid online attacks. Keywords: E-Commerce, Security breach, Online frauds, Vulnerabilities, Fraud, Attack on E-commerce.Item Efficient way of web development using python and flask(International Journal of Advanced Research in Computer Science, 2015-03) Lokhande, P. S.; Aslam, Fankar; Hawa, Nabeel; Munir, Jumal; Gulamgaus, MuradeWeb is the most frequently used networking aid which satisfies the requirements of all types of users; it provides a solution for any type of problem definition. While developing a web portal the appearance of web portal makes a development more critical. The good appearance of a web can easily attract more number of visitors which is a success of web portal. For designing and developing such well structured and with the good appearance of web we have to choose a proper technology. The technological needs of satisfying a good web portal can be fulfilled by "python" and "flask".Item Implementation of Mobile Agent Architecture for E- Commerce Application for Mobile Devices(International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 2013-12) Lokhande, P. S.“Mobility” is a term which newly acclaimed with the increased used on mobile devices. To support business application on remote places this proposed architecture helped by a mobile intelligent agent. By using mobile devices, buyers or sellers can create a mobile intelligent agent; the ability of mobile migration (mobility) on internet agents can do the business on behalf of buyers & seller. Mobile agents are beneficial to do the business anytime and anywhere. Searching for appropriate trader and negotiating with the trader is handled by mobile agent which reduce the time consuming task of the user. As we know that mobile devices owns the limited bandwidth connections with greater expenses. The proposed system architecture can address the problem of expensive connection with limited bandwidth. After launching mobile intelligent agent through network, seller/buyer can disconnect from mobile devices and later on can reconnect to devices for the results. For moving across the network; FIPA standardization provides flexibility & increase interoperability among other agent systems and scalability is provided by proposing system architecture. As per market survey; with compared to other mobile operating system, Android captured 80% market share worldwide for that reason the proposed system is designed for Android mobile devices. For delegating of human users (Buyers / Sellers) on the distributed system environment agents are created and by the migration process on the internet the agents can handle the shopping job on behalf of them and generate the results. The proposed system is demonstrated by C# (Server side) and Android application development tool (Client side). The proposed article helps to understand the proposed system architecture and operation of mobile agents in the system.Item Learning from the Past Intrusion Attacks: Digital Evidence Collection to Make e-Commerce Systems More Secure(Conference ICL2009, 2009-09) Lokhande, P. S.Use of computers, data communication and data storage devices has become so ubiquitous that most of the crimes or civil disputes have involvement in some way. There will be a large demand for computer forensics in the coming days. Computer forensic has four phases: Collection, Presentation, Filtering and presentation. Computer Forensic: It is an art and science of applying computer science to aid the legal process. Computer involvement in crime such as fraud, child pornography and threatening emails. Another situation where computers commonly assist in a crime is intellectual property theft in the corporate environment. Computers were the targets of the crime such as during a Denial of Service (DoS) attack against an E-Commerce site. It is often less obvious than previous cases. Computer contains information that is incidental to the crime such as a database containing the payment and receipts list of gamblers, drug traffickers, and scammers. Pay and receipts (owe) are the documents made in spreadsheets to keep track of their customers and suppliers. In the same cases other innocent bystanders computers, WiFi networks may have hacked to send threatening mail for example mails sent by terrorist group before the bomb Blast in various cities of India.Item Performance and Security Measure of Highly Performed Enterprise Content Management System(International Journal of Computer Applications, 2012-05) Lokhande, P. S.“ENTERPRISE CONTENT MANAGEMENT SYSTEM” (ECMS) is an extension to CONTENT MANAGEMENT SYSTEM (CMS). In this paper we will see the performance measure and security measure of website that is developed and hosted using three different platform, One website we have made in LIFERAY(open source enterprise content management system) and MYSQL as database, Second we have made using JSP and MYSQL as database run on the free web space, third we have made again using JSP and MYSQL as database but we have bought web space from provider .We will compare all three websites to see which one has the better efficiency or which can handle the better stress using the webstress tool developed by us, for the performance measure of all three websites. We have evaluated the performance by considering following parameter 1)Performance Test 2) Stress Test 3) Ramp Test and security measure by considering following parameters 1) SQL INJECTION 2) CROSS-SITE SCRIPTING on the above three websitesItem Smart electronic billing(AIKTC, 2015-05) Lokhande, P. S.; Muqri, Hamza (11CO30); Rangari, Nabeel (12CO98); Shrivas,Saurabh (11CO43); Usmani, Sahil (11CO48)In recent trends, Customers prefer to do online shopping though more than 50% of the customers are not satisfied in quality, size and worthiness of the products. For touch and feel satisfaction, choice of items customers wanted to go for direct shopping comparatively. Even in direct shopping, Customers feel hard to buy large number of products as it is difficult to carry the items throughout the shopping. Billing process consumes more time especially during the weekends and results to loss of patience among customers. Thereby introducing a new methodology here which overcomes the drawbacks mentioned in direct shopping. This methodology is the smartest way of shopping where the customer can choose the product directly based on the quality and the size by scanning the bar code on the price tag of the product via mobile application. This eliminates the carrying of items throughout the shopping. This will also provide an easier way of billing the items using the mobile application. Billing is made easy as this process does not require manual/traditional way of cash payment. Thus this methodology not only comforts the customers but also the merchants as it provides a trouble-free approach for shopping. HamzaItem SQL Injection Prevention Using Random4 Algorithm(AIKTC, 2016-05) Lokhande, P. S.; Shaikh, Abedulla Dastageer Nasrin (12CO97); Rakhangi, AasimHanifMunira (11CO36)Web Applications form an integral part of our day to day life. The number of attacks on websites and the compromise of many individuals secure data are increasing at an alarming rate. With the advent of social networking and e-commerce, web security attacks such as phishing and spamming have become quite common. The consequences of these attacks are ruthless. Hence, providing increased amount of security for the users and their data becomes essential. Most important vulnerability as described in top 10 web security issues by Open Web Application Security Project is SQL Injection Attack (SQLIA). This paper focuses on how the advantages of randomization can be employed to prevent SQL injection attacks in web based applications. SQL injection can be used for unauthorized access to a database to penetrate the application illegally, modify the database or even remove it. For a hacker to modify a database, details such as field and table names are required. So we try to propose a solution to the above problem by preventing it using an encryption algorithm based on randomization and other solution is using Hirschberg algorithm, it is a divide and conquer approach to reduce the time and space complexity. It has better performance and provides increased security in comparison to the existing solutions. Also the time to crack the database takes more time when techniques such as dictionary and brute force attack are deployed. Our main aim is to provide increased security by developing a tool which prevents illegal access to the database.Item Survey on Contribution of Agent Technology for Implementing an Application for Mobile devices(International Journal of Advanced Research in Computer Science and Software Engineering, 2013-11) Lokhande, P. S.Internet technology is spread widely in a short time span. With the growth of internet electronic data exchange is also increasing; which is responsible for the invention of e-business. The use of e-commerce is also suddenly increases with the upcoming technologies invented in the field of e-business. The traditional e-commerce system requires the human interaction for selling to buying process, but with the invention of intelligent agent technology the task become simpler. In a wide range of internet application new breed of software is used which is nothing but an intelligent agent. Intelligent agents are used as a supplement of human interaction, managing electronic mail and intelligent user interfaces. In the next phase of e-commerce trading mobile agent technology is introduced. Mobile agents are intelligent, pro-active and independent representatives of businesses. As we know stationary agents supports to automate trading capabilities and intelligent negotiation models; and mobile agents can easily connect with mobile devices such as PDAs and mobile phones. This paper investigates how mobile agents can be more beneficial in e-commerce society and their contribution in e-trading. Keywords — E- commerce, intelligent agent, mobile agent, RPC, PDA,Item Web Scalability(AIKTC, 2016-05) Lokhande, P. S.; Patil, Amit Suresh Archana (12CO53); Mirsinge, Ibad Ibrahim Saba(12CO42); Tulve, Shabab Kasim Shagufta(12CO62); Siddique, Asma AbdulWahab Zaibunnisa (12CO14)Web Scalability is the phenomenon when the incoming user requests on a server increases such that it exceeds the server capability to handle them and the system is able to somehow cope up with the increasing load. Since all servers can serve limited users if limit exceeds the server will either slow down or will crash. In today world all businesses are dependent on internet, as business grows the number of users accessing the web also increases which eventually grows the load on servers. Our project provides a mechanism for the businesses carried over internet to handle the icreasing amount of workload. The system provides an easy and handy solution to manage the user requests by mapping them on available server with the help of load balancing.