This document summarizes the key aspects of computer network security. It discusses the importance of network security due to increased interconnectivity and risk of intellectual property theft. It describes common internet attack methods like viruses, Trojans, eavesdropping and denial of service attacks. It also discusses network security technologies used to defend against attacks, such as firewalls, encryption, intrusion detection systems. The document outlines security considerations for network design like access control, authentication, integrity and non-repudiation. It examines vulnerabilities in the internet architecture and security issues in different versions of the internet protocol. Finally, it discusses future directions for network security.
In the past decade, internet of things IoT has been a focus of research. It makes more intelligent to core element of modern world such as hospitals, cities, organizations, and buildings. Usually, IoT has four major components including sensing, information processing, applications and services, heterogeneous access and additional components e.g. Security and privacy. In this paper, we are presenting security perspective from the perspective of layers that comprises IoT. In this we focus on the overview of IoT security perspective. Sunilkumar Malge | Pallavi Singh ""Internet of Things (IoT): Security Perspective"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd24010.pdf
Paper URL: https://www.ijtsrd.com/computer-science/artificial-intelligence/24010/internet-of-things-iot-security-perspective/sunilkumar-malge
Analysis of Honeypot Networks and Intrusion Prevention System IPS on Wireless...ijtsrd
Honeypot is a way to trap or ward off unauthorized use attempts in an information system. Honeypots are a distraction for hackers, so that it appears as if they have succeeded in breaking into and retrieving data from a network, even though in fact the data is not important and the location is already isolated. One type of honeypot is honeyd. Honeyd is a honeypot with a low interaction type which has less risk than the high interaction type because the interaction with the honeypot does not directly involve the actual system. Security issues are one of the important aspects of a network, especially network security on servers. This problem underlies the need to build a system that can detect threats from parties who do not have access rights hackers , namely by building a honeypot security system. Honeypot is. The aim of implementing Honeypot and IPS is that it can be used as a tool for administrators to view activity reports produced by Honeyd and administrators can also view reports stored in logs to help determine network security policies. Karina Asmara | M. Fakhri | Togu Harlen Lbn. Raja "Analysis of Honeypot Networks and Intrusion Prevention System (IPS) on Wireless Networks" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63502.pdf Paper Url: https://www.ijtsrd.com/computer-science/computer-network/63502/analysis-of-honeypot-networks-and-intrusion-prevention-system-ips-on-wireless-networks/karina-asmara
Security Issues and Challenges in Internet of Things – A ReviewIJERA Editor
The Internet of Things (IoT) alludes to the continually developing system of physical articles that component an
IP address for web availability, and the correspondence that happens between these items and other Web
empowered gadgets and frameworks. The security issues of the Internet of Things (IoT) are straight forwardly
identified with the wide utilization of its framework. IoT securities and enhancing the design and several
elements of this work showcases various security issues with respect to IoT and thinks of solutions for the issues
under the advancements included. Here we are going to do a study of all the security issues existing in the
Internet of Things (IoT) alongside an examination of the protection issues that an end-client might confront as
an outcome of the spread of IoT. Most of the overview is centred around the security emerging out of the data
trade innovations utilized as a part of Internet of Things. As a piece of IoTs, genuine concerns are raised over
access of individual data relating to gadget and individual protection. This review tells about the security and
protection issues of IoT.
In the past decade, internet of things IoT has been a focus of research. It makes more intelligent to core element of modern world such as hospitals, cities, organizations, and buildings. Usually, IoT has four major components including sensing, information processing, applications and services, heterogeneous access and additional components e.g. Security and privacy. In this paper, we are presenting security perspective from the perspective of layers that comprises IoT. In this we focus on the overview of IoT security perspective. Sunilkumar Malge | Pallavi Singh ""Internet of Things (IoT): Security Perspective"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd24010.pdf
Paper URL: https://www.ijtsrd.com/computer-science/artificial-intelligence/24010/internet-of-things-iot-security-perspective/sunilkumar-malge
Analysis of Honeypot Networks and Intrusion Prevention System IPS on Wireless...ijtsrd
Honeypot is a way to trap or ward off unauthorized use attempts in an information system. Honeypots are a distraction for hackers, so that it appears as if they have succeeded in breaking into and retrieving data from a network, even though in fact the data is not important and the location is already isolated. One type of honeypot is honeyd. Honeyd is a honeypot with a low interaction type which has less risk than the high interaction type because the interaction with the honeypot does not directly involve the actual system. Security issues are one of the important aspects of a network, especially network security on servers. This problem underlies the need to build a system that can detect threats from parties who do not have access rights hackers , namely by building a honeypot security system. Honeypot is. The aim of implementing Honeypot and IPS is that it can be used as a tool for administrators to view activity reports produced by Honeyd and administrators can also view reports stored in logs to help determine network security policies. Karina Asmara | M. Fakhri | Togu Harlen Lbn. Raja "Analysis of Honeypot Networks and Intrusion Prevention System (IPS) on Wireless Networks" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63502.pdf Paper Url: https://www.ijtsrd.com/computer-science/computer-network/63502/analysis-of-honeypot-networks-and-intrusion-prevention-system-ips-on-wireless-networks/karina-asmara
Security Issues and Challenges in Internet of Things – A ReviewIJERA Editor
The Internet of Things (IoT) alludes to the continually developing system of physical articles that component an
IP address for web availability, and the correspondence that happens between these items and other Web
empowered gadgets and frameworks. The security issues of the Internet of Things (IoT) are straight forwardly
identified with the wide utilization of its framework. IoT securities and enhancing the design and several
elements of this work showcases various security issues with respect to IoT and thinks of solutions for the issues
under the advancements included. Here we are going to do a study of all the security issues existing in the
Internet of Things (IoT) alongside an examination of the protection issues that an end-client might confront as
an outcome of the spread of IoT. Most of the overview is centred around the security emerging out of the data
trade innovations utilized as a part of Internet of Things. As a piece of IoTs, genuine concerns are raised over
access of individual data relating to gadget and individual protection. This review tells about the security and
protection issues of IoT.
Security Technique and Congestion Avoidance in Mesh Networkijtsrd
Security in wireless network is one of the prime concern in todays Information Age, where information is an asset not only to an organisation but also to an individual. Security to a great extent is able to protect the network from various unauthorized attacks. On the other side implementation of security mechanisms also causes an overhead in terms of increased load in the network. Further the increased load in the network paves path to congestion which degrades the performance of the wireless network. In this paper we try to highlight various challenges pertaining to security in mesh networks and the ways of reducing security threats. We propose an improved version of AODV which has a congestion avoidance mechanism. We also use a security technique called PGP for enhanced security of Mesh network. Mankiran Kaur | Jagjit Kaur"Security Technique and Congestion Avoidance in Mesh Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-6 , October 2017, URL: http://www.ijtsrd.com/papers/ijtsrd4690.pdf http://www.ijtsrd.com/engineering/computer-engineering/4690/security-technique-and-congestion-avoidance-in-mesh-network/mankiran-kaur
Peripheral Review and Analysis of Internet Network SecurityIJRES Journal
This paper is on the exploration of Internet Network security. With the advent of the internet, security became a major concern for computer users, organizations and the Military. The internet structure itself allow for many security threats to occur. Knowing the attack methods, the architecture of the internet when modified can reduce the possible attacks that can be sent across the network. The internet can be secured by the means of VPN, IPSec, Anti‐Malware Software and scanners, Secure Socket Layer, intrusion‐detection, security management, firewalls and cryptography mechanisms. The essence of this research is to forecast the future of internet network security.
In the past decade, internet of things (IoT) has been a
focus of research. Security and privacy are the key issues for IoT
applications, and still face some enormous challenges. In order to
facilitate this emerging domain, we in brief review the research
progress of IoT, and pay attention to the security. By means of
deeply analyzing the security architecture and features, the
security requirements are given. On the basis of these, we discuss
the research status of key technologies including encryption
mechanism, communication security, protecting sensor data and
cryptographic algorithms, and briefly outline the challenges.
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsEditor IJCATR
Due to extensive growth of the Internet and increasing availability of tools and methods for intruding and attacking
networks, intrusion detection has become a critical component of network security parameters. TCP/IP protocol suite is the defacto
standard for communication on the Internet. The underlying vulnerabilities in the protocols is the root cause of intrusions. Therefor
Intrusion detection system becomes an important element in network security that controls real time data and leads to huge
dimensional problem. Processing large number of packets and data in real time is very difficult and costly. Therefor data preprocessing
is necessary to remove redundant and unwanted information from packets and clean network data. Here, we are focusing on
two important aspects of intrusion detection; one is accuracy and other is performance. The layered approach of TCP/IP model can be
applied to packet pre-processing to achieve early and faster intrusion detection. Motivation for the paper comes from the large impact
data preprocessing has on the accuracy and capability of anomaly-based NIPS. In this paper it is demonstrated that high attack
detection accuracy can be achieved by using layered approach for data preprocessing in Internet. To reduce false positive rate and to
increase efficiency of detection, the paper proposed framework for preprocessing in intrusion prevention system. We experimented
with real time network traffic as well as he KDDcup99 dataset for our research.
The Internet of Things (IoT) is thriving network of smart objects where one physical object can exchange information with another physical object. In today’s Internet of Things (IoT) the interest is the concealment and security of data in a network. The obtrusion into Internet of Things (IoT) exposes the extent with which the internet of things is vulnerable to attacks and how such attack can be detected to prevent extreme damage. It emphasises on threats, vulnerability, attacks and possible methods of detecting intruders to stop the system from further destruction, this paper proposes a way out of the impending security situation of Internet of things using IPV6 Low -power wireless personal Area Network.
A new algorithm to enhance security against cyber threats for internet of thi...IJECEIAES
One major problem is detecting the unsuitability of traffic caused by a distributed denial of services (DDoS) attack produced by third party nodes, such as smart phones and other handheld Wi-Fi devices. During the transmission between the devices, there are rising in the number of cyber attacks on systems by using negligible packets, which lead to suspension of the services between source and destination, and can find the vulnerabilities on the network. These vulnerable issues have led to a reduction in the reliability of networks and a reduction in consumer confidence. In this paper, we will introduce a new algorithm called rout attack with detection algorithm (RAWD) to reduce the affect of any attack by checking the packet injection, and to avoid number of cyber attacks being received by the destination and transferred through a determined path or alternative path based on the problem. The proposed algorithm will forward the real time traffic to the required destination from a new alternative backup path which is computed by it before the attacked occurred. The results have showed an improvement when the attack occurred and the alternative path has used to make sure the continuity of receiving the data to the main destination without any affection.
E-Commerce Privacy and Security SystemIJERA Editor
The Internet is a public networks consisting of thousand of private computer network connected together. Private computer network system is exposed to potential threats from anywhere on the public network. In physical world, crimes often leave evidence finger prints, footprints, witnesses, video on security comes and so on. Online a cyber –crimes, also leaves physical, electronic evidence, but unless good security measures are taken, it may be difficult to trace the source of cyber crime. In certain e-commerce-related areas, such as networking, data transfer and data storage, researchers applied scanning and testing methods, modeling analysis to detect potential risks .In the Security system ,Questions are related to online security in which given options are Satisfied, Unsatisfied ,Neutral, Yes, No. and weak password , Strong password. it is revealed that it is quite difficult, if not impossible, to suggest that which online security is best. Online security provide the flexibility, efficiency of work, provide the better security of net banking . The main feature of the research that the data is safe in banking management for long time and open any account after along time. The Future scope of the study of Security is use to reduce threats. Security is used in the long run results in the reduction of number of branches, saying rentals of related and properties. If the better Security operate than net banking and e-marketing will be increase.
E-Commerce Privacy and Security SystemIJERA Editor
The Internet is a public networks consisting of thousand of private computer network connected together. Private computer network system is exposed to potential threats from anywhere on the public network. In physical world, crimes often leave evidence finger prints, footprints, witnesses, video on security comes and so on. Online a cyber –crimes, also leaves physical, electronic evidence, but unless good security measures are taken, it may be difficult to trace the source of cyber crime. In certain e-commerce-related areas, such as networking, data transfer and data storage, researchers applied scanning and testing methods, modeling analysis to detect potential risks .In the Security system ,Questions are related to online security in which given options are Satisfied, Unsatisfied ,Neutral, Yes, No. and weak password , Strong password. it is revealed that it is quite difficult, if not impossible, to suggest that which online security is best. Online security provide the flexibility, efficiency of work, provide the better security of net banking . The main feature of the research that the data is safe in banking management for long time and open any account after along time. The Future scope of the study of Security is use to reduce threats. Security is used in the long run results in the reduction of number of branches, saying rentals of related and properties. If the better Security operate than net banking and e-marketing will be increase.
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Scientific Review SR
A pervasive network architecture that interconnect heterogeneous objects, devices, technologies and services called
Internet of Things has prompted a drastic change in demand of smart devices which in turn has increased the rate of
data exchange. These smart devices are built with numerous sensors which collect information from other interacting
devices, process it and send it to remote locations for storage or further processing. Although this mechanism of data
processing and sharing has contributed immensely to the information world, it has recently posed high security risk
on privacy and data confidentiality. This paper therefore analyses different security threats to data at different
architectural layers of Internet of Things, possible countermeasures and other in-depth security measures for Internet
of Things. The paper identifies device authentication on IoT network to be of paramount impo rtance in securing IoT
systems. This paper also suggests some essential technologies of security such as encryption for securing IoT
devices and the data shared over IoT network
As more business activities are being automated and an increasing number of computers are being used to store sensitive information, the need for secure computer systems becomes more apparent. This need is even more apparent as systems and applications are being distributed and accessed via an insecure network, such as the internet. The internet itself has become critical for governments, companies, financial institutions, and millions of everyday users. Networks of computers support a multitude of activities whose loss would all cripple these organizations. As a consequences Cyber Security issues have become national security issues. Protecting the internet is a very difficult task. Cyber Security can be obtained only through systematic development. P. H. Gopi Kannan | A. Karthik | M. Karthikeyan "Cyber Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd33483.pdf Paper Url: https://www.ijtsrd.com/computer-science/computer-security/33483/cyber-security/p-h-gopi-kannan
WoMaster's new White Paper introduces Cyber Security features according to IEC62443 standard and proposes solutions for new cyber risks of industry 4.0.
Due to inherent limitations in wireless sensor networks, security is a crucial issue. While research in WSN security is progressing at tremendous pace, no comprehensive document lists the security issues and the threat models which pose unique threats to the wireless sensor networks. In this paper we have made an effort to document all the known security issues in wireless sensor networks and have provided the research direction towards countermeasures against the threats posed by these issues
Due to inherent limitations in wireless sensor networks, security is a crucial issue. While research in WSN security is progressing at tremendous pace, no comprehensive document lists the security issues and the threat models which pose unique threats to the wireless sensor networks. In this paper we have made an effort to document all the known security issues in wireless sensor networks and have provided the research direction towards countermeasures against the threats posed by these issues
Security Technique and Congestion Avoidance in Mesh Networkijtsrd
Security in wireless network is one of the prime concern in todays Information Age, where information is an asset not only to an organisation but also to an individual. Security to a great extent is able to protect the network from various unauthorized attacks. On the other side implementation of security mechanisms also causes an overhead in terms of increased load in the network. Further the increased load in the network paves path to congestion which degrades the performance of the wireless network. In this paper we try to highlight various challenges pertaining to security in mesh networks and the ways of reducing security threats. We propose an improved version of AODV which has a congestion avoidance mechanism. We also use a security technique called PGP for enhanced security of Mesh network. Mankiran Kaur | Jagjit Kaur"Security Technique and Congestion Avoidance in Mesh Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-6 , October 2017, URL: http://www.ijtsrd.com/papers/ijtsrd4690.pdf http://www.ijtsrd.com/engineering/computer-engineering/4690/security-technique-and-congestion-avoidance-in-mesh-network/mankiran-kaur
Peripheral Review and Analysis of Internet Network SecurityIJRES Journal
This paper is on the exploration of Internet Network security. With the advent of the internet, security became a major concern for computer users, organizations and the Military. The internet structure itself allow for many security threats to occur. Knowing the attack methods, the architecture of the internet when modified can reduce the possible attacks that can be sent across the network. The internet can be secured by the means of VPN, IPSec, Anti‐Malware Software and scanners, Secure Socket Layer, intrusion‐detection, security management, firewalls and cryptography mechanisms. The essence of this research is to forecast the future of internet network security.
In the past decade, internet of things (IoT) has been a
focus of research. Security and privacy are the key issues for IoT
applications, and still face some enormous challenges. In order to
facilitate this emerging domain, we in brief review the research
progress of IoT, and pay attention to the security. By means of
deeply analyzing the security architecture and features, the
security requirements are given. On the basis of these, we discuss
the research status of key technologies including encryption
mechanism, communication security, protecting sensor data and
cryptographic algorithms, and briefly outline the challenges.
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsEditor IJCATR
Due to extensive growth of the Internet and increasing availability of tools and methods for intruding and attacking
networks, intrusion detection has become a critical component of network security parameters. TCP/IP protocol suite is the defacto
standard for communication on the Internet. The underlying vulnerabilities in the protocols is the root cause of intrusions. Therefor
Intrusion detection system becomes an important element in network security that controls real time data and leads to huge
dimensional problem. Processing large number of packets and data in real time is very difficult and costly. Therefor data preprocessing
is necessary to remove redundant and unwanted information from packets and clean network data. Here, we are focusing on
two important aspects of intrusion detection; one is accuracy and other is performance. The layered approach of TCP/IP model can be
applied to packet pre-processing to achieve early and faster intrusion detection. Motivation for the paper comes from the large impact
data preprocessing has on the accuracy and capability of anomaly-based NIPS. In this paper it is demonstrated that high attack
detection accuracy can be achieved by using layered approach for data preprocessing in Internet. To reduce false positive rate and to
increase efficiency of detection, the paper proposed framework for preprocessing in intrusion prevention system. We experimented
with real time network traffic as well as he KDDcup99 dataset for our research.
The Internet of Things (IoT) is thriving network of smart objects where one physical object can exchange information with another physical object. In today’s Internet of Things (IoT) the interest is the concealment and security of data in a network. The obtrusion into Internet of Things (IoT) exposes the extent with which the internet of things is vulnerable to attacks and how such attack can be detected to prevent extreme damage. It emphasises on threats, vulnerability, attacks and possible methods of detecting intruders to stop the system from further destruction, this paper proposes a way out of the impending security situation of Internet of things using IPV6 Low -power wireless personal Area Network.
A new algorithm to enhance security against cyber threats for internet of thi...IJECEIAES
One major problem is detecting the unsuitability of traffic caused by a distributed denial of services (DDoS) attack produced by third party nodes, such as smart phones and other handheld Wi-Fi devices. During the transmission between the devices, there are rising in the number of cyber attacks on systems by using negligible packets, which lead to suspension of the services between source and destination, and can find the vulnerabilities on the network. These vulnerable issues have led to a reduction in the reliability of networks and a reduction in consumer confidence. In this paper, we will introduce a new algorithm called rout attack with detection algorithm (RAWD) to reduce the affect of any attack by checking the packet injection, and to avoid number of cyber attacks being received by the destination and transferred through a determined path or alternative path based on the problem. The proposed algorithm will forward the real time traffic to the required destination from a new alternative backup path which is computed by it before the attacked occurred. The results have showed an improvement when the attack occurred and the alternative path has used to make sure the continuity of receiving the data to the main destination without any affection.
E-Commerce Privacy and Security SystemIJERA Editor
The Internet is a public networks consisting of thousand of private computer network connected together. Private computer network system is exposed to potential threats from anywhere on the public network. In physical world, crimes often leave evidence finger prints, footprints, witnesses, video on security comes and so on. Online a cyber –crimes, also leaves physical, electronic evidence, but unless good security measures are taken, it may be difficult to trace the source of cyber crime. In certain e-commerce-related areas, such as networking, data transfer and data storage, researchers applied scanning and testing methods, modeling analysis to detect potential risks .In the Security system ,Questions are related to online security in which given options are Satisfied, Unsatisfied ,Neutral, Yes, No. and weak password , Strong password. it is revealed that it is quite difficult, if not impossible, to suggest that which online security is best. Online security provide the flexibility, efficiency of work, provide the better security of net banking . The main feature of the research that the data is safe in banking management for long time and open any account after along time. The Future scope of the study of Security is use to reduce threats. Security is used in the long run results in the reduction of number of branches, saying rentals of related and properties. If the better Security operate than net banking and e-marketing will be increase.
E-Commerce Privacy and Security SystemIJERA Editor
The Internet is a public networks consisting of thousand of private computer network connected together. Private computer network system is exposed to potential threats from anywhere on the public network. In physical world, crimes often leave evidence finger prints, footprints, witnesses, video on security comes and so on. Online a cyber –crimes, also leaves physical, electronic evidence, but unless good security measures are taken, it may be difficult to trace the source of cyber crime. In certain e-commerce-related areas, such as networking, data transfer and data storage, researchers applied scanning and testing methods, modeling analysis to detect potential risks .In the Security system ,Questions are related to online security in which given options are Satisfied, Unsatisfied ,Neutral, Yes, No. and weak password , Strong password. it is revealed that it is quite difficult, if not impossible, to suggest that which online security is best. Online security provide the flexibility, efficiency of work, provide the better security of net banking . The main feature of the research that the data is safe in banking management for long time and open any account after along time. The Future scope of the study of Security is use to reduce threats. Security is used in the long run results in the reduction of number of branches, saying rentals of related and properties. If the better Security operate than net banking and e-marketing will be increase.
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Scientific Review SR
A pervasive network architecture that interconnect heterogeneous objects, devices, technologies and services called
Internet of Things has prompted a drastic change in demand of smart devices which in turn has increased the rate of
data exchange. These smart devices are built with numerous sensors which collect information from other interacting
devices, process it and send it to remote locations for storage or further processing. Although this mechanism of data
processing and sharing has contributed immensely to the information world, it has recently posed high security risk
on privacy and data confidentiality. This paper therefore analyses different security threats to data at different
architectural layers of Internet of Things, possible countermeasures and other in-depth security measures for Internet
of Things. The paper identifies device authentication on IoT network to be of paramount impo rtance in securing IoT
systems. This paper also suggests some essential technologies of security such as encryption for securing IoT
devices and the data shared over IoT network
As more business activities are being automated and an increasing number of computers are being used to store sensitive information, the need for secure computer systems becomes more apparent. This need is even more apparent as systems and applications are being distributed and accessed via an insecure network, such as the internet. The internet itself has become critical for governments, companies, financial institutions, and millions of everyday users. Networks of computers support a multitude of activities whose loss would all cripple these organizations. As a consequences Cyber Security issues have become national security issues. Protecting the internet is a very difficult task. Cyber Security can be obtained only through systematic development. P. H. Gopi Kannan | A. Karthik | M. Karthikeyan "Cyber Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd33483.pdf Paper Url: https://www.ijtsrd.com/computer-science/computer-security/33483/cyber-security/p-h-gopi-kannan
WoMaster's new White Paper introduces Cyber Security features according to IEC62443 standard and proposes solutions for new cyber risks of industry 4.0.
Due to inherent limitations in wireless sensor networks, security is a crucial issue. While research in WSN security is progressing at tremendous pace, no comprehensive document lists the security issues and the threat models which pose unique threats to the wireless sensor networks. In this paper we have made an effort to document all the known security issues in wireless sensor networks and have provided the research direction towards countermeasures against the threats posed by these issues
Due to inherent limitations in wireless sensor networks, security is a crucial issue. While research in WSN security is progressing at tremendous pace, no comprehensive document lists the security issues and the threat models which pose unique threats to the wireless sensor networks. In this paper we have made an effort to document all the known security issues in wireless sensor networks and have provided the research direction towards countermeasures against the threats posed by these issues
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
ER(Entity Relationship) Diagram for online shopping - TAEHimani415946
https://bit.ly/3KACoyV
The ER diagram for the project is the foundation for the building of the database of the project. The properties, datatypes, and attributes are defined by the ER diagram.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
1. SEE PROFILE
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/359876244
Computer Network Security
Article in International Journal of Innovative Research in Science Engineering and Technology · April 2022
DOI: 10.5281/zenodo.6448170
CITATIONS
2
READS
6,265
1 author:
Narendra Chahar
Central University of Rajasthan
2 PUBLICATIONS 2 CITATIONS
All content following this page was uploaded by Narendra Chahar on 11 April 2022.
The user has requested enhancement of the downloaded file.
2. Volume 7, Issue 3, March – 2022 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
IJISRT22MAR747 www.ijisrt.com 1031
Computer Network Security
Narendra Kumar Chahar
Assistant Professor
Department of Computer Science and Engineering
Jayoti Vidyapeeth Women’s University, Jaipur
Abstract:- Network security is becoming increasingly
important to personal computer users, businesses, and
the military. Security became a major concern with the
advent of the internet, and understanding the history of
security allows a better understanding of the emergence
of security technology. Many security threats can occur
due to the structure of the internet. If the internet's
architecture is changed, it can reduce the number of
possible attacks that can be sent across the network.
Knowing the attack methods enables us to respond with
adequate security. Many businesses use firewalls and
encryption mechanisms to protect themselves from the
internet. To stay connected to the internet, businesses
create an "intranet."
Keywords:- Data Security, Network Security, IPv4, IPv6,
Internet Architecture.
I. INTRODUCTION
Because of the Internet and new networking technology,
the world is becoming more interconnected. Worldwide,
there is a wealth of personal, commercial, military, and
government information on networking infrastructures.
Because of the ease with which intellectual property can be
acquired via the internet, network security is becoming
increasingly important. Intellectual property can be violated.
There are two types of networks: data networks and
synchronous networks comprised of switches.
The internet is classified as a data network. Because the
current data network is made up of computer-based routers,
special programmes, such as "Trojan horses," planted in the
routers, can obtain information. Because the synchronous
network, which is made up of switches, does not buffer data,
it is not vulnerable to attackers. That is why data networks,
such as the internet, and other networks that connect to the
internet, place a premium on security.
The vast topic of network security is investigated by
investigating the following:
Internet architecture and vulnerable Internet security
aspects
Internet attack types and security measures
Network security for internet-connected networks
Current network security hardware and software
development.
II. NETWORK SECURITY
System and network technology is essential for a wide
range of applications. Security is required for networks and
applications. Despite the fact that network security is a
critical requirement, there is a significant lack of security
methods that can be easily implemented.
There is a "communication gap" between security
technology developers and network developers. The Open
Systems Interface (OSI) model underpins network design,
which is a well-developed process. Different layer protocols
can be easily combined to form stacks that allow for modular
development. Individual layer implementations can be
changed later without affecting other layers, allowing for
development flexibility. Secure network design, in contrast to
network design, is not a well-developed process. There is no
methodology for dealing with the complexities of security
requirements. Secure network design does not provide the
same benefits as network design.
Network security does not imply securing both ends of
the network. The communication channel should not be
vulnerable to attack when transmitting data. A potential
hacker could target the communication channel, obtain the
encrypted data, decrypt it, and then reintroduce a false
message. It is just as important to secure the middle network
as it is to secure the computers and encrypt the message.
When designing a secure network, the following factors
must be considered:
Access– Authorized users are given the ability to
communicate to and from a specific network.
Confidentiality– Data in the network is kept private.
Authentication – Ensure that network users are who they
claim to be.
Integrity – Ensure that the message has not been altered in
transit.
Nonrepudiation – Ensure that the user does not deny using
the network.
An effective network security plan is developed with an
understanding of security issues, potential attackers, required
level of security, and factors that make a network vulnerable
to attack. There are numerous products available to make the
computer less vulnerable to network attacks. Encryption,
firewalls, intrusion detection, security management, and
authentication mechanisms are examples of these tools.
Businesses all over the world use a combination of some of
these tools. "Intranets" are both connected to and reasonably
protected from the internet.
The internet architecture itself is at the helm as a result
of network flaws Understanding internet security issues
3. Volume 7, Issue 3, March – 2022 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
IJISRT22MAR747 www.ijisrt.com 1032
greatly aids in the development of secure solutions to protect
networks from the internet.
The types of internet attacks must also be studied in
order to detect and defend against them. Intrusion detection
systems are built around the most common types of attacks.
In network intrusions, packets are introduced to cause
problems for the following reasons:
Not a proper use of resources
Interfering with the intended function of any system
resource
Gaining system knowledge such as passwords and logins
that can be used in later attacks.
III. DIFFERENCE BETWEEN DATA SECURITY
AND NETWORK SECURITY
Data security is the aspect of security that allows a
client's data to be converted into incomprehensible data for
transmission. Even if this unintelligible data is intercepted,
decoding the message requires a key. To some extent, this
security method is effective. In the past, strong cryptography
was easily broken; however, this is no longer the case. Due to
the advancement of hackers, cryptographic methods must
constantly evolve in order to stay one step ahead.
It is advantageous to use a secure network when
transferring cypher text over a network. This will protect the
cypher text, making it less likely that many people will
attempt to break the code. A secure network will also prevent
unauthorized messages from being inserted into the network.
As a result, hard cyphers and attack hard networks are
required.
Fig. 1
Figure 1 depicts the relationship between network
security and data security and the OSI model. Because
cryptography takes place at the application layer, application
writers are aware of its existence. The user may select from a
variety of data security methods. The physical layer is
primarily responsible for network security. Layers above the
physical layer are also used to achieve the required network
security. Authentication takes place on a layer that is above
the physical layer. Physical layer network security
necessitates failure detection, attack detection mechanisms,
and intelligent countermeasure strategies.
IV. VULNERABLE SECURITY ASPECTS IN
INTERNET ARCHITECTURE
Organizations are using protected private networks or
intranets due to concerns about security breaches on the
Internet. The Internet Engineering Task Force (IETF) has
added security mechanisms to the Internet Protocol Suite at
various layers. These security mechanisms enable the logical
protection of data units as they travel across the network. The
security implications of the current and new versions of the
Internet Protocol are assessed. Although security exists
within the protocol, not all attacks are protected. These
attacks are examined in order to determine whether
additional security measures are required.
The IP Security architecture of the internet protocol is a
standardization of internet security. IP security, or IP sec,
refers to both the new generation of IP (IPv6) and the current
version (IPv4). Although new techniques, such as IP sec,
have been developed to address some of the internet's most
well-known shortcomings, they appear to be insufficient.
Fig. 2: Visual representation of IPsec implementation
to provide secure communications
IPsec is a point-to-point protocol in which one side
encrypts, the other side decrypts, and both sides share the
same key or keys. IPsec has two modes of operation:
transport mode and tunnel mode.
V. ATTACKS THROUGH IPV4 AND SECURITY
ISSUES IN IPV6
A. Common Internet Attack Methods
The most common internet attack methods are classified.
Some attacks, such as eavesdropping and phishing, gain
system knowledge or personal information. Attacks are
possible.
Viruses, worms, and trojans can also interfere with the
system's intended function. Another type of attack is when
the system's resources are used inefficiently, which can be
caused by a denial of service (DoS) attack. Other types of
network intrusions include land attacks, surf attacks, and
teardrop attacks.
These attacks aren't as well-known as DoS attacks, but
they're still used in some form or another, even if they're not
mentioned by name.
4. Volume 7, Issue 3, March – 2022 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
IJISRT22MAR747 www.ijisrt.com 1033
Viruses: Viruses are self-replicating programmes that infect
and spread through files [8]. When a file is opened, the
virus enters the system and becomes active.
Trojans: Trojans may appear to the user to be harmless
programmes, but they will actually serve a malicious
purpose. Trojans typically transport a payload, such as a
virus [8].
Eavesdropping: Eavesdropping is the act of intercepting
communications by an unauthorized party. Passive
eavesdropping occurs when a person only listens in secret
to networked messages. Active eavesdropping, on the other
hand, occurs when the intruder listens and inserts
something into the communication stream. As a result, the
messages may become distorted. This method can be used
to steal sensitive information [8].
Phishing: The attempt to obtain confidential information
from an individual, group, or organization is known as
phishing [9]. Phishers trick users into disclosing sensitive
information such as credit card numbers, online banking
credentials, and other personal information.
Denial of service: Denial of Service is an attack that occurs
when a system receives an excessive number of requests
and is unable to communicate with the requestors [9].
While waiting for the handshake to complete, the system
consumes resources. Eventually, the system will be unable
to respond to any further requests, rendering it inoperable.
IP Spoofing: Spoofing means having the computer's
address mirror the address of a trusted computer in order to
gain access to other computers. The identity of the intruder
is concealed in various ways, making detection and
prevention difficult. IP spoofed packets cannot be
eliminated with current IP protocol technology [8].
B. Internet Security Technologies
Internet threats will continue to be a major concern in the
global community as long as information can be accessed and
transferred via the Internet. To deal with these attacks,
various defense and detection mechanisms were developed.
Firewall: A firewall is a common border control or
perimeter defense mechanism. A firewall's purpose is to
block traffic from the outside, but it can also be used to
block traffic from the inside. A firewall is the first line of
defense against intruders. It's a system that prevents
unauthorized access to or from a private network. Firewalls
can be implemented in both hardware and software, or in a
hybrid of the two [8].
Cryptographic Systems: Today, cryptography is a valuable
and widely used tool in security engineering. It entailed the
use of codes and cyphers to convert information into
incomprehensible data. As a result, this unintelligible data
is safely transferred across the network.
Secure Socket Layer: The Secure Socket Layer (SSL)
protocol suite is a standard method for achieving a high
level of security between a web browser and a website. SSL
is intended to create a secure channel, or tunnel, between a
web browser and a web server, so that any information
exchanged within the secured tunnel is protected. Through
the use of certificates, SSL allows clients to authenticate to
servers. To prove their identity, clients present a certificate
to the server.
Intrusion Detection System: An Intrusion Detection System
(IDS) is an additional security measure that aids in the
prevention of computer intrusions. IDS systems can be both
software and hardware devices that detect attacks. IDS
products are used to monitor connections in order to
determine whether or not attacks have been launched. Some
intrusion detection systems (IDS) simply monitor and alert
when an attack occurs, whereas others attempt to prevent
the attack.
VI. SECURITY IN COMPUTER NETWORK
The network security field is following in the footsteps
of its predecessors. With the addition of biometric
identification, the same methodologies are used. Biometrics
is a more secure method of authentication than passwords.
This could significantly reduce unauthorized access to secure
systems. The software aspect of network security is
constantly evolving. New firewalls and encryption schemes
are constantly being implemented. The research being
conducted aids in understanding current developments as
well as projecting future developments in the field. There are
two main deployments are defined in the network security as
Software Deployment and Hardware Deployment.
VII. FUTURE SCOPE OF NETWORK SECURITY
The set of applications will influence Internet security
more than anything else. In the future, security may resemble
as an immune system. The immune system defends against
attacks and prepares itself to face more difficult foes.
Similarly, network security will be able to serve as an
immune system.
The biometrics movement may have begun some time
ago, but it does not appear to be aggressively pursued. Many
security developments are occurring inside the same set of
security technology that is now in use, with minimal
alterations. After so many years of evolution, there are some
loopholes i.e., bypassing or altering the security measures
that needed to change and must be secured. Multiple levels of
security measures can prevent them.
VIII. CONCLUSION
Network security is an essential area that is gaining
traction as the internet grows in size. To evaluate the
necessary changes in security technology, the security threats
and internet protocol were analyzed. The majority of security
technology is software-based, but several common hardware
devices are included. The current state of network security is
unimpressive.
With the importance of the network security area, it was
believed that new approaches to security, both hardware and
software, would be actively investigated. It was surprising to
realize that the majority of the progress was taking place in
the same technologies that are already in use.
In the near future, the combination of IPv6 and security
measures such as firewalls, intrusion detection, and
authentication procedures will be successful in protecting
5. Volume 7, Issue 3, March – 2022 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
IJISRT22MAR747 www.ijisrt.com 1034
View publication stats
intellectual property. To deal with future dangers, the
network security area may need to evolve more quickly.
REFERENCES
[1.] Dowd,P.W.;McHenry,J.T.,"Networksecurity:it'stimetota
keitseriously,"Computer, vol.31,no.9,
pp.24‐28,Sep1998
[2.] Kartalopoulos, S. V., "Differentiating Data Security and
Network
Security,"Communications,2008.ICC'08.IEEEInternatio
nalConferenceon,pp.1469‐1473,19‐23May2008
[3.] “SecurityOverview,”
www.redhat.com/docs/manuals/enterprise/RHEL‐4‐Ma
nual/security‐guide/ch‐sgs‐ov.html.
[4.] Molva, R., Institut Eurecom,“Internet Security
Architecture,” in
ComputerNetworks&ISDNSystemsJournal, vol.
31,pp.787‐804, April1999
[5.] Sotillo, S., East Carolina University, “IPv6 security
issues,” August
2006,www.infosecwriters.com/text_resources/pdf/IPv6
_SSotillo.pdf.
[6.] Warfield M., “Security Implications of IPv6,” Internet
Security
SystemsWhitePaper,documents.iss.net/whitepapers/IPv
6.pdf
[7.] AndressJ.,“IPv6:thenextinternetprotocol,”April2005,ww
w.usenix.com/publications/login/2005‐04/pdfs/andress0
504.pdf.
[8.] Adeyinka, O., "Internet Attack Methods and Internet
Security
Technology,"Modeling&Simulation,2008.AICMS08.Se
condAsiaInternationalConferenceon,vol.,no.,pp.77‐82,1
3‐15May2008
[9.] Marin, G.A., "Network security basics," Security &
Privacy, IEEE, vol.3,no.6,pp.68‐72,Nov.‐Dec.2005
[10.] Priyank Sanghavi, Kreena Mehta, “Network Security”,
IJSRP, http://www.ijsrp.org/research-paper-0813/ijsrp-
p20131.pdf
[11.] Dr. Pradosh Chandra Patnaik, “Network Security:
Concepts and Various Aspects for Treating the
Attacks”, IJSDR2102055