ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Intrusion Detection For Known And Unknown Security

Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.1, No. 12)

Publication Date:

Authors : ;

Page : 586-591

Keywords : DNS Spoofing & Cache Poisoning;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Internet has enabled us to connect to any computer, at any time from any geographical location. But at the same time there is possibility of security attacks. However, security attacks are not limited only to the Internet; attacks can even be on our own local area network (LAN) or wireless LAN. As networks were actually created to share information among users and other services, some network administrators never strove for higher secur In fact in some cases, network security was compromised for easiness in sharing files or for remote access/control like enabling file sharing, SNMP (Simple Network Management Protocol) etc. Due to Internet large number of users to network a

Last modified: 2014-11-15 22:48:32