Network Security: Attacks, Tools and Techniques
@inproceedings{Ghansela2013NetworkSA, title={Network Security: Attacks, Tools and Techniques}, author={Siddharth Ghansela}, year={2013} }
Network security is main issue of this generation of computing because many types of attacks are increasing day by day. Establishing a network is not a big issue for network administrators but protecting the entire network is a big issue. There are various methods and tools are available today for destroying the existing network. In this paper we mainly emphasize on the network security also we present some major issues that can affect ourĀ
No Paper Link Available
13 Citations
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
- Computer Science
- 2015
The main aim of this research is to protect the network from vulnerabilities, threats, attacks configuration weaknesses and security policy weaknesses.
Network Security, A Challenge
- Computer Science
- 2016
Network security is more challenging than ever, as today's corporate networks become increasingly complex.
Software Quality Assurance in Network Security Using Cryptographic Techniques
- Computer Science, Mathematics
- 2015
Certain cryptographic techniques are discussed which have shown far better improvement in the network security with enhanced quality assurance and their possible solutions based on the new cryptosystems.
International Conference on Intelligent Computing, Communication & Convergence
- Computer Science
- 2015
The network security confidentiality vector, network security integrity vector and network security availability vector are described and some major type of attacks in MANET are presented.
A Review on Cryptography Algorithms, Attacks and Encryption Tools
- Computer Science, Mathematics
- 2015
Three basic cryptography algorithms are reviewed and basic tools of encryption for secure messaging, transactions and connectivity are pointed out.
A Survey on Cryptographic Techniques for Network Security
- Computer Science, Mathematics
- 2015
This paper is to compare the most commonly used algorithms for data encryption and investigates the performance analysis of different algorithms under different settings.
A survey on wireless networks attacks
- Computer Science2017 2nd International Conference on Computing and Communications Technologies (ICCCT)
- 2017
A survey on wireless network attacks is put forward that discusses various security methods which helps in protecting against different types of attacks and also the research areas need to be concentrated for further development.
Comparative Analysis of Hash Function and Symmetric Algorithm for Data Security in Wireless Sensor Networks
- Computer Science
- 2018
System security is the imperative part in data security since it is in charge of securing all information went through system and arrange security has turned out to be more critical for exchange of information.
An empirical study on automotive cyber attacks
- Computer Science2018 IEEE 4th World Forum on Internet of Things (WF-IoT)
- 2018
This study will majorly focus on the Cyber-Security vulnerabilities and threats that are possible in automotive electronics.
References
SHOWING 1-5 OF 5 REFERENCES
An Ontology for Network Security Attacks
- Computer ScienceAACC
- 2004
This review is based on standard texts, using well-known concepts, categorizations, and methods to construct a framework which is then used to define an extensible ontology for network security attacks.
Design and implementation of integrated security engine for secure networking
- Computer ScienceThe 6th International Conference on Advanced Communication Technology, 2004.
- 2004
A security framework that allows secure networking by mounting integrated security engine to the network nodes like router or switch and describes core functions and algorithms implemented for the functions is introduced.
Hardening Cisco routers
- Computer Science
- 2002
This succinct book departs from other security literature by focusing exclusively on ways to secure Cisco routers, rather than the entire network, and supplies you with all the tools necessary to turn a potential vulnerability into a strength.
Evaluating the security threat of firewall data corruption caused by instruction transient errors
- Computer ScienceProceedings International Conference on Dependable Systems and Networks
- 2002
Results from simulating the SAN model indicate that error-caused security vulnerabilities can be a non-negligible source of a security threats to a highly secure system.
Design and implementation of a private and public key crypto processor and its application to a security system
- Computer Science, MathematicsIEEE Trans. Consumer Electron.
- 2004
The design and implementation of a crypto processor, a special-purpose microprocessor optimized for the execution of cryptography algorithms, which can be used for various security applications such as storage devices, embedded systems, network routers, security gateways using IPSec and SSL protocol, etc.