Intrusions in Computer Networks - A Perspective
Journal: International Journal of Computer Science and Mobile Applications IJCSMA (Vol.2, No. 11)Publication Date: 2014-11-30
Authors : Gulshan Kumar;
Page : 18-23
Keywords : Data Breaches; Intrusions; Intrusion detection; Intrusion detection system; Network Security; Security Threats;
Abstract
Nowadays, the Internet is the thing that we all want and like. Today, we are dependent on its abilities to publish, and find the information. We are using its ability to perform online shopping, and communication. Unfortunately, most of the popular softwares contain flaws and mis-configuration. These flaws fail to work with all possible conditions, especially unusual user input. Finding and patching of all software flaws is a major problem of the industry. The intruders exploit flaws in software to mount a variety of intrusions into computer networks. The intrusions affect the users in multiple ways. The protection from intrusions enforces the organizations to bear the additional costs. But, the cost involved in protection from the intrusions is often insignificant when equated with the actual cost of a successful intrusion.
In this paper, we explored various types of intrusions and categorized them based upon their behavior and method. Motive behind the intrusions are uncovered. The paper highlights the need of effective intrusion detection. The study in this paper will help the better understanding of different types of intrusions and motivation behind them. The findings of this paper provide useful insights into literature and are beneficial for those who are interested in applications and development of IDSs and related fields.
Other Latest Articles
- Evaluation Metrics for Intrusion Detection Systems - A Study
- CONTROLLING AND MODELLING OF AN H-BRIDGE DRIVE BY USING SVPWM
- Critical Scan Path Based Energy Efficient LDPC Decoder using DD-BMP?
- DERMATOLOGICAL MANIFESTATIONS AMONG PATIENTS WITH CHRONIC RENAL DISEASE ON HEMODYALISIS
- TERRITORIAL MARKETING FOR DEVELOPMENT OF TOURISM
Last modified: 2014-11-03 19:41:23