Research Article | Open Access | Download PDF
Volume 3 | Issue 2 | Year 2013 | Article Id. IJPTT-V3I2P406 | DOI : https://doi.org/10.14445/22492615/IJPTT-V3I2P406A Study on Network Security Aspects and Attacking Methods
P. Aruna Devi, S. Rani Lakshmi, K.Sathiyavaishnavi
Citation :
P. Aruna Devi, S. Rani Lakshmi, K.Sathiyavaishnavi, "A Study on Network Security Aspects and Attacking Methods," International Journal of P2P Network Trends and Technology (IJPTT), vol. 3, no. 2, pp. 21-26, 2013. Crossref, https://doi.org/10.14445/22492615/IJPTT-V3I2P406
Abstract
Keywords
Internet, Intranet, Attacks, Security, Open Systems Interface, Department of Defense, Denial Of Service, Secure Socket Layer, Virtual Private Networks, personal identification number
References
[1] Dowd, P.W.; McHenry,J.T., "Network security: it's time to
take it Seriously," Computer, vol.31, no.9, pp.24‐ 28, Sep
1998
[2] Kartalopoulos, S. V., "Differentiating Data Security and
Network Security," Communications, 2008. ICC '08. IEEE
International Conference on, pp.1469‐1473, 19‐23 May
2008
[3] “Security Overview,”
www.redhat.com/docs/manuals/enterprise/RHEL‐4‐
Manual/security‐guide/ch‐sgs‐ov.html.
[4] Molva, R., Institut Eurecom,“Internet Security
Architecture,” in Computer Networks & ISDN Systems
Journal, vol. 31, pp. 787‐804, April 1999
[5] Sotillo, S., East Carolina University, “IPv6 security
issues,” August 2006,
www.infosecwriters.com/text_resources/pdf/IPv6_SSot
illo.pdf.
[6] AndressJ., “IPv6:the next internet protocol,” April 2005,
www.usenix.com/publications/login/2005‐
04/pdfs/andress0504.pdf
[7] Warfield M., “Security Implications of IPv6,” Internet
Security Systems White
Paper,documents.iss.net/whitepapers/IPv6.pdf
[8] Adeyinka,O., "Internet Attack Methods and Internet
Security Technology," Modeling&Simulation, 2008.
AICMS 08. Second Asia International Conference on, vol.,
no., pp.77‐82, 13‐15 May 2008
[9] Marin,G.A., "Network security basics," Security&
Privacy, IEEE , vol.3, no.6, pp. 68‐72,Nov.‐Dec. 2005.
[10] “Internet History Timeline,”
www3.baylor.edu/~Sharon_P_Johnson/etg/inthistory.htm
[11] Landwehr, C.E.;Goldschlag,D.M., "Security issues in
networks with Internet access," Proceedings of the IEEE,
vol.85, no.12, pp.2034‐2051,Dec 1997
[12] "Intranet." Wikipedia, The Free Encyclopedia. 23 Jun
2008, 10:43UTC. Wikimedia Foundation, Inc. 2 Jul 2008.
[16] Curtin, M. “Introduction to Network Security,”
http://www.interhack.net/pubs/network‐security.
[17] “Improving Security,” Http://www.cert.org/tech_tips,
2006.
[18] Serpanos,D.N.; Voyiatzis, A.G., "Secure network design:
A layered approach," Autonomous Decentralized System,
2002. The 2nd International Workshop on, vol., no., pp.
95‐100, 6‐7Nov. 2002
[19] Ohta, T.; Chikaraishi, T., "Network security model,"
Networks, 1993. International Conference on Information
Engineering '93. 'Communications and Networks for the
Year 2000', Proceedings of IEEE Singapore International
Conference on , vol.2, no., pp.507‐511 vol.2, 6‐11 Sep
1993