• Corpus ID: 167494730

Network Security: Attacks, Tools and Techniques

@inproceedings{Ghansela2013NetworkSA,
  title={Network Security: Attacks, Tools and Techniques},
  author={Siddharth Ghansela},
  year={2013}
}
Network security is main issue of this generation of computing because many types of attacks are increasing day by day. Establishing a network is not a big issue for network administrators but protecting the entire network is a big issue. There are various methods and tools are available today for destroying the existing network. In this paper we mainly emphasize on the network security also we present some major issues that can affect our 
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
TLDR
The main aim of this research is to protect the network from vulnerabilities, threats, attacks configuration weaknesses and security policy weaknesses.
Network Security, A Challenge
TLDR
Network security is more challenging than ever, as today's corporate networks become increasingly complex.
Software Quality Assurance in Network Security Using Cryptographic Techniques
TLDR
Certain cryptographic techniques are discussed which have shown far better improvement in the network security with enhanced quality assurance and their possible solutions based on the new cryptosystems.
International Conference on Intelligent Computing, Communication & Convergence
TLDR
The network security confidentiality vector, network security integrity vector and network security availability vector are described and some major type of attacks in MANET are presented.
A Review on Cryptography Algorithms, Attacks and Encryption Tools
TLDR
Three basic cryptography algorithms are reviewed and basic tools of encryption for secure messaging, transactions and connectivity are pointed out.
A Survey on Cryptographic Techniques for Network Security
TLDR
This paper is to compare the most commonly used algorithms for data encryption and investigates the performance analysis of different algorithms under different settings.
A survey on wireless networks attacks
  • S. Surya, G. A. Magrica
  • Computer Science
    2017 2nd International Conference on Computing and Communications Technologies (ICCCT)
  • 2017
TLDR
A survey on wireless network attacks is put forward that discusses various security methods which helps in protecting against different types of attacks and also the research areas need to be concentrated for further development.
Comparative Analysis of Hash Function and Symmetric Algorithm for Data Security in Wireless Sensor Networks
TLDR
System security is the imperative part in data security since it is in charge of securing all information went through system and arrange security has turned out to be more critical for exchange of information.
An empirical study on automotive cyber attacks
TLDR
This study will majorly focus on the Cyber-Security vulnerabilities and threats that are possible in automotive electronics.
...
...

References

SHOWING 1-5 OF 5 REFERENCES
An Ontology for Network Security Attacks
TLDR
This review is based on standard texts, using well-known concepts, categorizations, and methods to construct a framework which is then used to define an extensible ontology for network security attacks.
Design and implementation of integrated security engine for secure networking
TLDR
A security framework that allows secure networking by mounting integrated security engine to the network nodes like router or switch and describes core functions and algorithms implemented for the functions is introduced.
Hardening Cisco routers
TLDR
This succinct book departs from other security literature by focusing exclusively on ways to secure Cisco routers, rather than the entire network, and supplies you with all the tools necessary to turn a potential vulnerability into a strength.
Evaluating the security threat of firewall data corruption caused by instruction transient errors
TLDR
Results from simulating the SAN model indicate that error-caused security vulnerabilities can be a non-negligible source of a security threats to a highly secure system.
Design and implementation of a private and public key crypto processor and its application to a security system
TLDR
The design and implementation of a crypto processor, a special-purpose microprocessor optimized for the execution of cryptography algorithms, which can be used for various security applications such as storage devices, embedded systems, network routers, security gateways using IPSec and SSL protocol, etc.