Intrusion Detection For Known And Unknown Security
Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.1, No. 12)Publication Date: 2012-12-30
Authors : Dr.Md.Yusuf Mulge;
Page : 586-591
Keywords : DNS Spoofing & Cache Poisoning;
Abstract
Internet has enabled us to connect to any computer, at any time from any geographical location. But at the same time there is possibility of security attacks. However, security attacks are not limited only to the Internet; attacks can even be on our own local area network (LAN) or wireless LAN. As networks were actually created to share information among users and other services, some network administrators never strove for higher secur In fact in some cases, network security was compromised for easiness in sharing files or for remote access/control like enabling file sharing, SNMP (Simple Network Management Protocol) etc. Due to Internet large number of users to network a
Other Latest Articles
Last modified: 2014-11-15 22:48:32