A Study on Network Security Aspects and Attacking Methods

  IJPTT-book-cover
 
International Journal of P2P Network Trends and Technology (IJPTT)          
 
© 2013 by IJPTT Journal
Volume-3 Issue-2                           
Year of Publication : 2013
Authors : P.Aruna Devi ,S.Rani Lakshmi,K.Sathiyavaishnavi

MLA

P.Aruna Devi ,S.Rani Lakshmi,K.Sathiyavaishnavi."A Study on Network Security Aspects and Attacking Methods". International Journal of P2P Network Trends and Technology (IJPTT), V3(2):21-26 Mar - Apr 2013, ISSN:2249-2615, www.ijpttjournal.org. Published by Seventh Sense Research Group.

Abstract

Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology. The architecture of the internet, when modified can reduce the possible attacks that can be sent across the network. Knowing the attack methods, allows for the appropriate security to emerge. Many businesses secure themselves from the internet by means of firewalls and encryption mechanisms. The businesses create an “intranet” to remain connected to the internet but secured from possible threats. The entire field of network security is vast and in an evolutionary stage. In order to understand the research being performed today, background knowledge of the internet, its vulnerabilities, attack methods through the internet, and security technology is important and therefore they are reviewed.

References

[1]Dowd, P.W.; McHenry,J.T., "Network security: it's time to take it Seriously," Computer, vol.31, no.9, pp.24‐ 28, Sep 1998
[2] Kartalopoulos, S. V., "Differentiating Data Security and Network Security," Communications, 2008. ICC '08. IEEE International Conference on, pp.1469‐1473, 19‐23 May 2008
[3]“Security Overview,” www.redhat.com/docs/manuals/enterprise/RHEL‐4 ‐ Manual/security‐guide/ch‐sgs‐ov.html.
[4] Molva, R., Institut Eurecom,“Internet Security Architecture,” in Computer Networks & ISDN Systems Journal, vol. 31, pp. 787‐804, April 199913
[5] Sotillo, S., East Carolina University, “IPv6 security issues,” August 2006, www.infosecwriters.com/text_resources/pdf/IPv6_ SSot illo.pdf.
[6] AndressJ., “IPv6:the next internet protocol,” April 2005, www.usenix.com/publications/login/2005‐ 04/pdfs/andress0504.pdf.
[7]Warfield M., “Security Implications of IPv6,” Internet Security Systems White Paper,documents.iss.net/whitepapers/IPv6.pdf
[8] Adeyinka,O., "Internet Attack Methods and Internet Security Technology," Modeling & Simulation, 2008. AICMS 08. Second Asia International Conference on, vol., no., pp.77‐82, 13‐15 May 2008
[9] Marin,G.A., "Network security basics," Security & Privacy, IEEE , vol.3, no.6, pp. 68‐72,Nov.‐Dec. 2005
[10] “Internet History Timeline,” www3.baylor.edu/~Sharon_P_Johnson/etg/inthistor y.htm
[11] Landwehr, C.E.;Goldschlag,D.M., "Security issues in networks with Internet access," Proceedings of the IEEE, vol.85, no.12, pp.2034‐2051,Dec 1997

Keywords

- Internet, Intranet, Attacks, Security, Open Systems Interface, Department of Defense, Denial Of Service, Secure Socket Layer, Virtual Private Networks, personal identification number