INTRUSION DETECTION USING NETWORK MONITORING TOOLS SINGH, GOPAL
Material type: TextPublication details: HYDERABAD ICFAI OCTOBER 2015Description: 46-58Subject(s): In: MURTHY, E N COMPUTER SCIENCESItem type | Current library | Call number | Vol info | Status | Notes | Date due | Barcode | Item holds | |
---|---|---|---|---|---|---|---|---|---|
Journal Article | Main Library | VOL. IX, NO.4/5555116JA4 (Browse shelf(Opens below)) | Available | 5555116JA4 | |||||
Journals and Periodicals | Main Library On Display | JOURNAL/IT/Vol 9, No 4/5555116 (Browse shelf(Opens below)) | Vol 9, No 4 (03/01/2016) | Not for loan | October, 2015 | 5555116 |
THE PAPER MAINLY FOCUSES ON HOW NETWORK MONITORING TOOLS CAN BE HELPFUL IN THE PROTECTION OF COMMUNICATION NETWORK AND HOW DIFFERENT KINDS OF NETWORK ATTACKS ARE PERFORMED. NOWADAYS, NETWORK SECURITY IS THE MAIN CONCERN OF EACH ORGANIZATION, HENCE NETWORK MONITORING HAS BECOME AN IMPORTANT PART OF COMPUTER SECURITY TO PREVENT ATTACKS. THERE ARE SEVERAL WAY TO PROTECT COMMUNICATION NETWORK SUCH AS FIREWALLS, VIRTUAL PRIVATE NETWORK (VPN), ENCRYTION TECHNIQUES. IN SPITE OF ALL THESE TECHNIQUES, INTRUSIONS STILL TAKE PLACE. IN SUCH CASES, NETWORK MONITORING TOOLS SUCH AS WIRESHARK AND SNORT PLAY AN IMPORTANT ROLE IN INTRUSION DETECTION. WIRESHARK AND SNORT ARE CAPABLE OF MONITORING NETWORK PROCESSES OR MOVEMENTS IN A GRAPHICAL WAY TO DETECT INTRUSION. NETWORK MONITORING THROUGH INTRUSION DETECTION SYSTEM (IDS) AND INTRUSION PREVENTION SYSTEM (IPS) HAS ENHANCED THE PERFORMANCE AND SECURITY OF THE NETWORK INFRASTRUCTURE.
There are no comments on this title.