Network Attacks and Intrusion Detection System: A Brief

被引:0
作者
Sharma, Neha V. [1 ]
Kavita [1 ]
Agarwal, Gaurav [1 ]
机构
[1] Manipal Univ Jaipur, Jaipur, Rajasthan, India
来源
2019 2ND INTERNATIONAL CONFERENCE ON INTELLIGENT COMMUNICATION AND COMPUTATIONAL TECHNIQUES (ICCT) | 2019年
关键词
Network Security; Network attacks; Internet services; IDS;
D O I
10.1109/icct46177.2019.8969033
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Security of a network has got a major importance in a wide range of systems. These days every place is connected to a network or via a network e.g. hospitals, offices, universities, finance sector etc. and almost everyone whether young or old is connected to social networking and community media. Though many systems are there that can secure any network, this attacking phenomenon keeps on increasing day by day. This paper focusses on some fundamentals like what basically a network attack is, how to prevent it, its types, preventive measures and current procedures that are focusing on this paradigm. Basically this paper is an attempt to help people understand the concept of attacks so as to avoid them.
引用
收藏
页码:280 / 283
页数:4
相关论文
共 17 条
  • [1] Abrams M., 2008, Malicious control system cyber security attack case study-maroochy water services, australia
  • [2] [Anonymous], INT C DISTR COMP INT, P377
  • [3] Barghi M. N., 2015, INT J ADV COMPUT SC
  • [4] Detecting botnet by anomalous traffic
    Chen, Chia-Mei
    Lin, Hsiao-Chung
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2015, 21 : 42 - 51
  • [5] Network defense: Approaches, methods and techniques
    Deka, Rup Kumar
    Kalita, Kausthav Pratirn
    Bhattacharya, D. K.
    Kalita, Jugal K.
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2015, 57 : 71 - 84
  • [6] Combating advanced persistent threats: From network event correlation to incident detection
    Friedberg, Ivo
    Skopik, Florian
    Settanni, Giuseppe
    Fiedler, Roman
    [J]. COMPUTERS & SECURITY, 2015, 48 : 35 - 57
  • [7] Kar D., 2015, SQLIDDS SQL INJECTIO
  • [8] Koo T. M., 2013, 2 INT C ADV COMP SCI
  • [9] Kour Haneet, 2016, International Journal of Advanced Networking and Applications, V7, P2862
  • [10] Latha S, 2017, P 2017 4 INT C ADV C, P1