INTRUSION DETECTION USING NETWORK MONITORING TOOLS SINGH, GOPAL
Material type: TextPublication details: HYDERABAD ICFAI OCTOBER 2015Description: 46-58Subject(s): In: MURTHY, E N COMPUTER SCIENCESItem type | Current library | Call number | Vol info | Status | Notes | Date due | Barcode | Item holds | |
---|---|---|---|---|---|---|---|---|---|
Journal Article | Main Library | VOL. IX, NO.4/5555116JA4 (Browse shelf(Opens below)) | Available | 5555116JA4 | |||||
Journals and Periodicals | Main Library On Display | JOURNAL/IT/Vol 9, No 4/5555116 (Browse shelf(Opens below)) | Vol 9, No 4 (03/01/2016) | Not for loan | October, 2015 | 5555116 |
Browsing Main Library shelves Close shelf browser (Hides shelf browser)
No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | ||
VOL. IX, NO. 4/5555116JA2 IMPROVED HEURISTIC ALGORITHM ANALYSIS FOR TASK SCHEDULING IN FLOW SHOP ENVIRONMENT | VOL. IX, NO. 4/5555204JA1 THE EFFECTS OF GENERIC COMPETENCES ON EMPLOYMENT OUTCOMES | VOL. IX, NO.4/5555116JA3 AN ANALYSIS OF THE BENEFITS OF CLOUD SERVICES FOR SUPPLY CHAIN USING ANALYTIC HIERARCHY PROCESS | VOL. IX, NO.4/5555116JA4 INTRUSION DETECTION USING NETWORK MONITORING TOOLS | VOL. IX, NO.4/5555204JA4 SOFT SKILLS: A PANACEA FOR ENCHANCING ENGINEERING GRADUATES' EMPLOYABILITY IN IT INDUSTRY | Vol. No. 46, No. 4/5555647JA3 A Case Study on Experiential Learning for Marketing Students | Vol. No. 46, No. 4/5555647JA4 Disruptive Business Model Innovation : How a Tech Firm is Changing the Traditional Taxi Service Industry |
THE PAPER MAINLY FOCUSES ON HOW NETWORK MONITORING TOOLS CAN BE HELPFUL IN THE PROTECTION OF COMMUNICATION NETWORK AND HOW DIFFERENT KINDS OF NETWORK ATTACKS ARE PERFORMED. NOWADAYS, NETWORK SECURITY IS THE MAIN CONCERN OF EACH ORGANIZATION, HENCE NETWORK MONITORING HAS BECOME AN IMPORTANT PART OF COMPUTER SECURITY TO PREVENT ATTACKS. THERE ARE SEVERAL WAY TO PROTECT COMMUNICATION NETWORK SUCH AS FIREWALLS, VIRTUAL PRIVATE NETWORK (VPN), ENCRYTION TECHNIQUES. IN SPITE OF ALL THESE TECHNIQUES, INTRUSIONS STILL TAKE PLACE. IN SUCH CASES, NETWORK MONITORING TOOLS SUCH AS WIRESHARK AND SNORT PLAY AN IMPORTANT ROLE IN INTRUSION DETECTION. WIRESHARK AND SNORT ARE CAPABLE OF MONITORING NETWORK PROCESSES OR MOVEMENTS IN A GRAPHICAL WAY TO DETECT INTRUSION. NETWORK MONITORING THROUGH INTRUSION DETECTION SYSTEM (IDS) AND INTRUSION PREVENTION SYSTEM (IPS) HAS ENHANCED THE PERFORMANCE AND SECURITY OF THE NETWORK INFRASTRUCTURE.
There are no comments on this title.