SecureSense: A Network Threat Detection and File Sharing System

Abstract

A strong security mechanism designed to protect shared data within corporations is introduced in this document. Our system uses hash checks, modern virus detection, user identification via facial recognition, encryption, and other techniques to guarantee secure data flow and efficiently stop the spread of malware. Our complete strategy strengthens cybersecurity, protects sensitive information, and supports data integrity within document sharing networks by including these measures. This multimodal strategy provides a strong defense, supporting organizations’ security postures against new threats. Our technology offers a foundation for seamless document sharing by combining real-time scanning, user authentication, and safe encryption. By placing a high priority on data protection and integrity, we enable companies to reliably communicate sensitive information, establishing safe and effective collaboration environments.

Country : Sri Lanka

1 K.K.K.P Wickramasinge2 G.D.D Ekanayake3 P.G.K.S Munasinghe4 S.N Hettiwatta5 S.M.B Harshanath6 S.K Rajapaksha

  1. Faculty of Computing, Sri Lanka Institute of Information Technology, Malabe, Sri Lanka
  2. Faculty of Computing, Sri Lanka Institute of Information Technology, Malabe, Sri Lanka
  3. Faculty of Computing, Sri Lanka Institute of Information Technology, Malabe, Sri Lanka
  4. Faculty of Computing, Sri Lanka Institute of Information Technology, Malabe, Sri Lanka
  5. Faculty of Computing, Sri Lanka Institute of Information Technology, Malabe, Sri Lanka
  6. Faculty of Computing, Sri Lanka Institute of Information Technology, Malabe, Sri Lanka

IRJIET, Volume 7, Issue 11, November 2023 pp. 370-377

doi.org/10.47001/IRJIET/2023.711050

References

  1. I.A. Saeed, A. Selamat, and A. M. Abuagoub, “A survey on malware and malware detection systems,” International Journal of Computer Applications, vol. 67, no. 16, 2013.
  2. N. Nissim, A. Cohen, C. Glezer, and Y. Elovici, “Detection of malicious pdf files and directions for enhancements: A state-of-the art survey,” Computers & Security, vol. 48, pp. 246–266, 2015.
  3. Z. Imran and R. Nizami, “Advance secure login,” International Journal of Scientific and Research Publications, vol. 1, no. 1, pp. 1–4, 2011.
  4. G. Verma and S. Kanrar, “Secure document sharing model based on blockchain technology and attribute-based encryption,” Multimedia Tools and Applications, pp. 1–18, 2023.
  5. A.B. Garba, J. Armarego, D. Murray, and W. Kenworthy, “Review of the information security and privacy challenges in bring your own device (byod) environments,” Journal of Information privacy and security, vol. 11, no. 1, pp. 38–54, 2015.
  6. C. H. Wu, R. K. Chiu, H. M. Yeh et al., “Implementation of a cloudbased electronic medical record exchange system in compliance with the integrating healthcare enterprise’s cross-enterprise document sharing integration profile,” International Journal of Medical Informatics, vol. 107, pp. 30–39, 2017.
  7. H. V. Nguyen, “Cybersecurity strategies for universities with bring your own device programs,” Ph.D. dissertation, Walden University, 2019.
  8. E. R. Weippl, I. K. Ibrahim, and W. Winiwarter, “Content-based management of document access control.” in INAP. Citeseer, 2001, pp. 78–86.
  9. M. L. Gaid and S. A. Salloum, “Homomorphic encryption,” in The International Conference on Artificial Intelligence and Computer Vision. Springer, 2021, pp. 634–642.