IES Management College And Research Centre

INTRUSION DETECTION USING NETWORK MONITORING TOOLS (Record no. 40869)

MARC details
000 -LEADER
fixed length control field 01535nam a22001697a 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20151211205540.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 151211b xxu||||| |||| 00| 0 eng d
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name SINGH, GOPAL
9 (RLIN) 20097
245 ## - TITLE STATEMENT
Title INTRUSION DETECTION USING NETWORK MONITORING TOOLS
Statement of responsibility, etc SINGH, GOPAL
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc HYDERABAD
Name of publisher, distributor, etc ICFAI
Date of publication, distribution, etc OCTOBER 2015
300 ## - PHYSICAL DESCRIPTION
Extent 46-58
500 ## - GENERAL NOTE
General note THE PAPER MAINLY FOCUSES ON HOW NETWORK MONITORING TOOLS CAN BE HELPFUL IN THE PROTECTION OF COMMUNICATION NETWORK AND HOW DIFFERENT KINDS OF NETWORK ATTACKS ARE PERFORMED. NOWADAYS, NETWORK SECURITY IS THE MAIN CONCERN OF EACH ORGANIZATION, HENCE NETWORK MONITORING HAS BECOME AN IMPORTANT PART OF COMPUTER SECURITY TO PREVENT ATTACKS. THERE ARE SEVERAL WAY TO PROTECT COMMUNICATION NETWORK SUCH AS FIREWALLS, VIRTUAL PRIVATE NETWORK (VPN), ENCRYTION TECHNIQUES. IN SPITE OF ALL THESE TECHNIQUES, INTRUSIONS STILL TAKE PLACE. IN SUCH CASES, NETWORK MONITORING TOOLS SUCH AS WIRESHARK AND SNORT PLAY AN IMPORTANT ROLE IN INTRUSION DETECTION. WIRESHARK AND SNORT ARE CAPABLE OF MONITORING NETWORK PROCESSES OR MOVEMENTS IN A GRAPHICAL WAY TO DETECT INTRUSION. NETWORK MONITORING THROUGH INTRUSION DETECTION SYSTEM (IDS) AND INTRUSION PREVENTION SYSTEM (IPS) HAS ENHANCED THE PERFORMANCE AND SECURITY OF THE NETWORK INFRASTRUCTURE.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element IDS, IPS, WIRESHARK, SNORT, SQL INJECTION, CROSS-SITE SCRIPTING, SOCIAL ENGINEERING
9 (RLIN) 20098
773 0# - HOST ITEM ENTRY
Host Biblionumber 30426
Host Itemnumber 55693
Main entry heading MURTHY, E N
Edition
Place, publisher, and date of publication IUP PUBLICATION HYDERABAD
Other item identifier 5555116
Title COMPUTER SCIENCES
Record control number
International Standard Serial Number
International Standard Book Number
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Journal Article
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Total Checkouts Full call number Barcode Date last seen Price effective from
    Dewey Decimal Classification     Main Library Main Library 11/12/2015   VOL. IX, NO.4/5555116JA4 5555116JA4 11/12/2015 11/12/2015

Circulation Timings: Monday to Saturday: 8:30 AM to 9:30 PM | Sundays/Bank Holiday during Examination Period: 10:00 AM to 6:00 PM