The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies

IJACSA

  • About the Journal
  • Call for Papers
  • Editorial Board
  • Author Guidelines
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Fees/ APC
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • GIDP 2026
  • ICONS_BA 2025

Computer Vision Conference (CVC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Editorial Board
  • Guidelines
  • Submit
  • Current Issue
  • Archives
  • Indexing
  • Fees
  • Reviewers
  • RSS Feed

DOI: 10.14569/IJACSA.2024.0150750
PDF

Deployment of Secure Data Parameters Between Stock Inverters and Interfaces Using Command-Contamination-Stealth Management System

Author 1: Santosh Kumar Henge
Author 2: Sanjeev Kumar Mandal
Author 3: Ameya Madhukar Rane
Author 4: Megha Sharma
Author 5: Ravleen Singh
Author 6: S Anka Siva Phani Kumar
Author 7: Anusha Marouthu

International Journal of Advanced Computer Science and Applications(IJACSA), Volume 15 Issue 7, 2024.

  • Abstract and Keywords
  • How to Cite this Article
  • {} BibTeX Source

Abstract: The security issues more impact on stock data which allows the stockholders (SHs) and stock-inverters (SIs) to predict and invert false assets and stock values. Because of the security flaws and threads that let an attacker take over network devices, the attacker uses the system to attack another system. These problems have an even greater influence on stock data, which gives stockholders (SHs) and stock-inverters (SIs) the ability to forecast and reverse fictitious assets and stock values. This study suggests test scenarios regulate different BOTNETs, layered threshold-influenced data security parameters, and DDoS vulnerabilities for stock data integration and validation. In order to study the behavioral entry and exit sites of SHs and SIs, it has integrated three-tiered procedures with threshold-impacted data security criteria and data matrices. Role Management (RM), Remote Level of Command Executions (RLCE), LAN-WAN-LAN Transmission (LWL-T), and Detection of Conceal and Prevention (DoCP) environments are the frameworks of the first layer. The RM, RLCE, LWL-T and DoCP are tuned with threshold-influenced data security parameters which are more influencing stock values. The second layer is framed with Module Management (MM), Command Module (ComM), Contamination Module (ConM), and Stealth Module (SM). The third layer is framed with expected scenarios and threshold of various vulnerabilities, a thread which occurs based on DoS and BOTNETs. All these layers are interconnected together and integrated with behavioral factors of SHs and SIs. The vulnerabilities are tuned with SHs and SIs input data, then filtered with SHs and SIs behavioral matrices, the alerts has been generated according to their existing entries of the data. These influenced threshold metrics tuned through ARIMA and LSTM for future analysis of stock values. The authentication mode has synchronized dual and multi authentication mode of execution, which tuned to cross verify the investors credentials.

Keywords: Robot-network (BOTNET); Module Management (MM); Role Management (RM); Detection Conceal and Prevention (DoCP); LAN-WAN-LAN transmission (LWL-T); Remote Level Command Executions (RLCE); Distributed Denial-of-Service (DDoS)

Santosh Kumar Henge, Sanjeev Kumar Mandal, Ameya Madhukar Rane, Megha Sharma, Ravleen Singh, S Anka Siva Phani Kumar and Anusha Marouthu. “Deployment of Secure Data Parameters Between Stock Inverters and Interfaces Using Command-Contamination-Stealth Management System”. International Journal of Advanced Computer Science and Applications (IJACSA) 15.7 (2024). http://dx.doi.org/10.14569/IJACSA.2024.0150750

@article{Henge2024,
title = {Deployment of Secure Data Parameters Between Stock Inverters and Interfaces Using Command-Contamination-Stealth Management System},
journal = {International Journal of Advanced Computer Science and Applications},
doi = {10.14569/IJACSA.2024.0150750},
url = {http://dx.doi.org/10.14569/IJACSA.2024.0150750},
year = {2024},
publisher = {The Science and Information Organization},
volume = {15},
number = {7},
author = {Santosh Kumar Henge and Sanjeev Kumar Mandal and Ameya Madhukar Rane and Megha Sharma and Ravleen Singh and S Anka Siva Phani Kumar and Anusha Marouthu}
}



Copyright Statement: This is an open access article licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

IJACSA

Upcoming Conferences

Computer Vision Conference (CVC) 2026

21-22 May 2026

  • Amsterdam, The Netherlands

Computing Conference 2026

9-10 July 2026

  • London, United Kingdom

Artificial Intelligence Conference 2026

3-4 September 2026

  • Amsterdam, The Netherlands

Future Technologies Conference (FTC) 2026

15-16 October 2026

  • Berlin, Germany
The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computer Vision Conference
  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

The Science and Information (SAI) Organization Limited is a company registered in England and Wales under Company Number 8933205.