ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Intrusions in Computer Networks - A Perspective

Journal: International Journal of Computer Science and Mobile Applications IJCSMA (Vol.2, No. 11)

Publication Date:

Authors : ;

Page : 18-23

Keywords : Data Breaches; Intrusions; Intrusion detection; Intrusion detection system; Network Security; Security Threats;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Nowadays, the Internet is the thing that we all want and like. Today, we are dependent on its abilities to publish, and find the information. We are using its ability to perform online shopping, and communication. Unfortunately, most of the popular softwares contain flaws and mis-configuration. These flaws fail to work with all possible conditions, especially unusual user input. Finding and patching of all software flaws is a major problem of the industry. The intruders exploit flaws in software to mount a variety of intrusions into computer networks. The intrusions affect the users in multiple ways. The protection from intrusions enforces the organizations to bear the additional costs. But, the cost involved in protection from the intrusions is often insignificant when equated with the actual cost of a successful intrusion. In this paper, we explored various types of intrusions and categorized them based upon their behavior and method. Motive behind the intrusions are uncovered. The paper highlights the need of effective intrusion detection. The study in this paper will help the better understanding of different types of intrusions and motivation behind them. The findings of this paper provide useful insights into literature and are beneficial for those who are interested in applications and development of IDSs and related fields.

Last modified: 2014-11-03 19:41:23