IES Management College And Research Centre

Image from Google Jackets

INTRUSION DETECTION USING NETWORK MONITORING TOOLS SINGH, GOPAL

By: Material type: TextTextPublication details: HYDERABAD ICFAI OCTOBER 2015Description: 46-58Subject(s): In: MURTHY, E N COMPUTER SCIENCES
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)

THE PAPER MAINLY FOCUSES ON HOW NETWORK MONITORING TOOLS CAN BE HELPFUL IN THE PROTECTION OF COMMUNICATION NETWORK AND HOW DIFFERENT KINDS OF NETWORK ATTACKS ARE PERFORMED. NOWADAYS, NETWORK SECURITY IS THE MAIN CONCERN OF EACH ORGANIZATION, HENCE NETWORK MONITORING HAS BECOME AN IMPORTANT PART OF COMPUTER SECURITY TO PREVENT ATTACKS. THERE ARE SEVERAL WAY TO PROTECT COMMUNICATION NETWORK SUCH AS FIREWALLS, VIRTUAL PRIVATE NETWORK (VPN), ENCRYTION TECHNIQUES. IN SPITE OF ALL THESE TECHNIQUES, INTRUSIONS STILL TAKE PLACE. IN SUCH CASES, NETWORK MONITORING TOOLS SUCH AS WIRESHARK AND SNORT PLAY AN IMPORTANT ROLE IN INTRUSION DETECTION. WIRESHARK AND SNORT ARE CAPABLE OF MONITORING NETWORK PROCESSES OR MOVEMENTS IN A GRAPHICAL WAY TO DETECT INTRUSION. NETWORK MONITORING THROUGH INTRUSION DETECTION SYSTEM (IDS) AND INTRUSION PREVENTION SYSTEM (IPS) HAS ENHANCED THE PERFORMANCE AND SECURITY OF THE NETWORK INFRASTRUCTURE.

There are no comments on this title.

to post a comment.

Circulation Timings: Monday to Saturday: 8:30 AM to 9:30 PM | Sundays/Bank Holiday during Examination Period: 10:00 AM to 6:00 PM