Empirical investigation of instant messaging security in a virtual environment

Show simple item record

dc.contributor.author Nyakomitta, Peter S.
dc.contributor.author Ogara, Solomon
dc.contributor.author Abeka, Silvance
dc.date.accessioned 2018-11-17T06:50:52Z
dc.date.available 2018-11-17T06:50:52Z
dc.date.issued 2016
dc.identifier.issn 2319–8656
dc.identifier.uri http://ir.jooust.ac.ke:8080/xmlui/handle/123456789/2834
dc.description.abstract Use of instant messaging services is becoming increasingly popular with Internet based systems like America Online’s Instant Messaging (AIM), Microsoft’s MSN Messenger, Yahoo! Messenger, WhatsApp, Viber, Kakaotalk, Skype and face book instant messenger. These tools support any process where quick response and rapid problem solving are needed, and where faster communication than emails or telephones is useful. More and more people are enjoying the convenience and simplicity provided by the real-time messaging systems in their day-to-day life. Moreover, the instant messaging services have also found applications in business. In this application domain, the instant messaging services are employed for communicating with customers and partners, offering customer support, receiving real-time alerts, as well as management and project coordination. Despite their heavy utilization, public instant messaging systems have been criticized for having a number of security weaknesses. These weaknesses originate from the facts that the instant messaging clients are always on, those logs can contain sensitive information, and that the communication goes through an externally controlled server. Most of the instant messaging services were never intended for secure communication in the first place. The rapid growth in the number of public instant messaging users has therefore created a new security concern for information technology managers. In this paper, a prototype instant messaging was developed and employed to investigate some of the security challenges in instant messaging applications. The results indicated that upon following the TCP stream, the instant messages were in plain text in the sending and receiving communication devices interfaces and therefore prone to eavesdropping. As such, the researchers propose a port-based algorithm that would scramble the data packets at the end devices, requiring the users to input decryption keys for the data to be transformed into human readable format en_US
dc.language.iso en en_US
dc.publisher International Journal of Computer Applications Technology and Research en_US
dc.subject Instant Messaging (IM) en_US
dc.subject Plain Text en_US
dc.subject prototype en_US
dc.subject Client, Server en_US
dc.subject Security en_US
dc.title Empirical investigation of instant messaging security in a virtual environment en_US
dc.type Article en_US

Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace

Advanced Search


My Account