Title: Survey and Analysis of NFT and Blockchain Technologies for Developing Agricultural Product Trading Systems
Cover Date: 2023-01-01
Cover Display Date: 2023
DOI: 10.1109/JCSSE58229.2023.10202015
Description: In this research, we have surveyed NFT technology and Blockchain technology. We have analyzed both technologies to apply them in the agricultural product trading to benefit farmers the most. We have examined the strengths of NFT and NFT Marketplace to find ways to utilize these strengths in agricultural product trading. Additionally, we have identified various obstacles and suggested solutions. From the research, we have found that agricultural product trading through NFT Marketplace can provide benefits such as transparency, allowing buyers and sellers to verify the relevant transactions, the number of trades, the initial purchase price, and the final selling price. Moreover, the NFT's ownership information cannot be forged as they are on the Blockchain. By integrating the system with the community enterprise, the government's support, and using crypto seed phrases and private keys tied to accounts, farmers can receive KYC (Know Your Customer) and prevent fraud. Furthermore, NFT Marketplace can show sales transactions of each product category, which can help farmers understand market demand and popularity. Additionally, buyers can choose popular and trustworthy sellers (farmers) based on transaction history.
Citations: 3
Aggregation Type: Conference Proceeding
-------------------


Title: The SQL injection attacking prevention applying the design techniques of IPTABLES
Cover Date: 2012-12-27
Cover Display Date: 2012
DOI: 10.4156/jcit.vol7.issue22.9
Description: This study presents the SQL Injection Prevention using the design techniques of IPTABLES. It applied the IPTABLES's special feature that is able to investigate the application layers to detect and drop the packets that contains SQL patterns (e.g. ' or '1'='). Besides, the study suggests the methods for designing the IPTABLES rule without a confliction or that has least possibility of confliction between the rules. The researcher presents how to adjust IPTABLES to filter the SQL Injection packets more rapidly by applying the concept of relation and Cartesian product into designing the rule and using the rule repositioning method. The researcher has also collected various patterns that used to be attacked with SQL Injection, from different reliable sources, to find out the common signatures. Then these patterns were concluded to be about 10 patterns only so that they would function with least overhead. In addition, the researcher has run the performance testing and found that the response time has been slightly increased, while the possibility of false positive appeared at an acceptable rate.
Citations: 0
Aggregation Type: Journal
-------------------


Title: Web's dynamic session IDs: Design and analysis
Cover Date: 2012-02-01
Cover Display Date: February 2012
DOI: 10.4156/jcit.vol7.issue2.10
Description: A number of websites is recently faced with the problems from Session Hijacking Attacks which are simple to be launched with higher possibility of success. Besides, this attacking is now popular amongst the hackers in which it is ranked on the Top 10 Web Attacking. Session Hijacking can be launched by capturing Cookie/Session IDs within an LAN, or by using XSS (Cross Site Scripting), which allows hackers to steal cookies from across the world and then use the captured Cookie/Session ID to access the system on a victim's identity. This problem is a result of using a Static Session ID. This research proposes a model to protect against Session hijacking by using a Non-Static Session ID instead of a Static Session ID. We combine Hashing of the Secret with Time to create the constantly changeable Session ID. With this model, a victim's session ID captured by hacker will not be able to be used for replay attacks. In addition, this model can prevent both manual and automatic Session Hijackings in which Client and Server has no need to synchronize the time and to use NTP.
Citations: 4
Aggregation Type: Journal
-------------------


Title: Top 10 free Web-Mail security test using Session Hijacking
Cover Date: 2008-12-29
Cover Display Date: 2008
DOI: 10.1109/ICCIT.2008.324
Description: This research presents the results of the experimental about security level of the Top 10 popular Free Web-Mail. These 10 Web Mails were hacked by means of Session Hijacking. The researcher conducted this experiment on the LAN system and used information capturing technique to gain Cookies and Session ID inside Cookies. Then, Hijacking was conducted by using two Hijacking methods. The first method, which was common and easy to conduct, used only one Cookie. The second method, which was not very popular but offered high penetrating power, used all Cookies (Cookies cloned by SideJacking tools). The results show that the Web Mails with the height security level are AOL Mail, GMX Mail and Yahoo Mail; and the Web Mails with the low security level are Gmail, Inbox Mail and Hotmail. © 2008 IEEE.
Citations: 10
Aggregation Type: Conference Proceeding
-------------------