Show simple item record

dc.contributor.authorNyakomitta, Peter S.
dc.contributor.authorOgara, Solomon
dc.contributor.authorAbeka, Silvance
dc.date.accessioned2018-11-17T06:50:52Z
dc.date.available2018-11-17T06:50:52Z
dc.date.issued2016
dc.identifier.issn2319–8656
dc.identifier.urihttp://ir.jooust.ac.ke:8080/xmlui/handle/123456789/2834
dc.description.abstractUse of instant messaging services is becoming increasingly popular with Internet based systems like America Online’s Instant Messaging (AIM), Microsoft’s MSN Messenger, Yahoo! Messenger, WhatsApp, Viber, Kakaotalk, Skype and face book instant messenger. These tools support any process where quick response and rapid problem solving are needed, and where faster communication than emails or telephones is useful. More and more people are enjoying the convenience and simplicity provided by the real-time messaging systems in their day-to-day life. Moreover, the instant messaging services have also found applications in business. In this application domain, the instant messaging services are employed for communicating with customers and partners, offering customer support, receiving real-time alerts, as well as management and project coordination. Despite their heavy utilization, public instant messaging systems have been criticized for having a number of security weaknesses. These weaknesses originate from the facts that the instant messaging clients are always on, those logs can contain sensitive information, and that the communication goes through an externally controlled server. Most of the instant messaging services were never intended for secure communication in the first place. The rapid growth in the number of public instant messaging users has therefore created a new security concern for information technology managers. In this paper, a prototype instant messaging was developed and employed to investigate some of the security challenges in instant messaging applications. The results indicated that upon following the TCP stream, the instant messages were in plain text in the sending and receiving communication devices interfaces and therefore prone to eavesdropping. As such, the researchers propose a port-based algorithm that would scramble the data packets at the end devices, requiring the users to input decryption keys for the data to be transformed into human readable formaten_US
dc.language.isoenen_US
dc.publisherInternational Journal of Computer Applications Technology and Researchen_US
dc.subjectInstant Messaging (IM)en_US
dc.subjectPlain Texten_US
dc.subjectprototypeen_US
dc.subjectClient, Serveren_US
dc.subjectSecurityen_US
dc.titleEmpirical investigation of instant messaging security in a virtual environmenten_US
dc.typeArticleen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record