International Journal of P2P
Network Trends and Technology

Research Article | Open Access | Download PDF
Volume 3 | Issue 2 | Year 2013 | Article Id. IJPTT-V3I2P406 | DOI : https://doi.org/10.14445/22492615/IJPTT-V3I2P406

A Study on Network Security Aspects and Attacking Methods


P. Aruna Devi, S. Rani Lakshmi, K.Sathiyavaishnavi

Citation :

P. Aruna Devi, S. Rani Lakshmi, K.Sathiyavaishnavi, "A Study on Network Security Aspects and Attacking Methods," International Journal of P2P Network Trends and Technology (IJPTT), vol. 3, no. 2, pp. 21-26, 2013. Crossref, https://doi.org/10.14445/22492615/IJPTT-V3I2P406

Abstract

Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology. The architecture of the internet, when modified can reduce the possible attacks that can be sent across the network. Knowing the attack methods, allows for the appropriate security to emerge. Many businesses secure themselves from the internet by means of firewalls and encryption mechanisms. The businesses create an “intranet” to remain connected to the internet but secured from possible threats. The entire field of network security is vast and in an evolutionary stage. In order to understand the research being performed today, background knowledge of the internet, its vulnerabilities, attack methods through the internet, and security technology is important and therefore they are reviewed.

Keywords

Internet, Intranet, Attacks, Security, Open Systems Interface, Department of Defense, Denial Of Service, Secure Socket Layer, Virtual Private Networks, personal identification number

References

[1] Dowd, P.W.; McHenry,J.T., "Network security: it's time to take it Seriously," Computer, vol.31, no.9, pp.24‐ 28, Sep 1998
[2] Kartalopoulos, S. V., "Differentiating Data Security and Network Security," Communications, 2008. ICC '08. IEEE International Conference on, pp.1469‐1473, 19‐23 May 2008
[3] “Security Overview,” www.redhat.com/docs/manuals/enterprise/RHEL‐4‐ Manual/security‐guide/ch‐sgs‐ov.html.
[4] Molva, R., Institut Eurecom,“Internet Security Architecture,” in Computer Networks & ISDN Systems Journal, vol. 31, pp. 787‐804, April 1999
[5] Sotillo, S., East Carolina University, “IPv6 security issues,” August 2006, www.infosecwriters.com/text_resources/pdf/IPv6_SSot illo.pdf.
[6] AndressJ., “IPv6:the next internet protocol,” April 2005, www.usenix.com/publications/login/2005‐ 04/pdfs/andress0504.pdf
[7] Warfield M., “Security Implications of IPv6,” Internet Security Systems White Paper,documents.iss.net/whitepapers/IPv6.pdf
[8] Adeyinka,O., "Internet Attack Methods and Internet Security Technology," Modeling&Simulation, 2008. AICMS 08. Second Asia International Conference on, vol., no., pp.77‐82, 13‐15 May 2008
[9] Marin,G.A., "Network security basics," Security& Privacy, IEEE , vol.3, no.6, pp. 68‐72,Nov.‐Dec. 2005.
[10] “Internet History Timeline,” www3.baylor.edu/~Sharon_P_Johnson/etg/inthistory.htm
[11] Landwehr, C.E.;Goldschlag,D.M., "Security issues in networks with Internet access," Proceedings of the IEEE, vol.85, no.12, pp.2034‐2051,Dec 1997 [12] "Intranet." Wikipedia, The Free Encyclopedia. 23 Jun 2008, 10:43UTC. Wikimedia Foundation, Inc. 2 Jul 2008.
[13] "Virtual private network."Wikipedia, The Free Encyclopedia. 30 Jun 2008, 19:32UTC. Wikimedia Foundation, Inc. 2 Jul 2008.
[14] Tyson,J., ”How Virtual private networks work,” http://www.howstuffworks.com/vpn.htm.
[15] Al‐Salqan, Y.Y., "Future trends in Internet security," Distributed Computing Systems, 1997., Proceedings of the Sixth IEEE Computer Society Work shop on Future Trends of, vol., no., pp.216‐217, 29‐31Oct 1997
[16] Curtin, M. “Introduction to Network Security,” http://www.interhack.net/pubs/network‐security.
[17] “Improving Security,” Http://www.cert.org/tech_tips, 2006.
[18] Serpanos,D.N.; Voyiatzis, A.G., "Secure network design: A layered approach," Autonomous Decentralized System, 2002. The 2nd International Workshop on, vol., no., pp. 95‐100, 6‐7Nov. 2002
[19] Ohta, T.; Chikaraishi, T., "Network security model," Networks, 1993. International Conference on Information Engineering '93. 'Communications and Networks for the Year 2000', Proceedings of IEEE Singapore International Conference on , vol.2, no., pp.507‐511 vol.2, 6‐11 Sep 1993