ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Study to Find Attacks using Restrictive Fields in Networks

Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.3, No. 3)

Publication Date:

Authors : ; ;

Page : 1692-1697

Keywords : Intrusion Detection; DoS attack; User2Root attack; Probe attack and R2L (SQL Injection) attack;

Source : Downloadexternal Find it from : Google Scholarexternal


Attacks Recognition countenances numerous challenges. An attack recognition system should dependably recognize spiteful tricks within a network or net setups and should carry out operations proficiently to cope up with huge congestion on network. This paper deals with study of 2 problem concerning Accurateness and Proficiency of applications vulnerable to attacks and provide solution to it through Restricted Fields and Multi Authentication Mechanism. We would study and discuss that the elevated attack recognition accurateness could be attained though Restricted Fields and elevated proficiency by applying the Multi Authentication Mechanism. Our proposed concept of system would be able to recognize 4 different types of attacks very effectively. The attacks to deal we consider in our concept are DoS attack, User2Root attack, Probe attack and R2L (SQL Injection) attack. At last, we present that our concept system is powerful enough to deal with suspicious data or actions without compromising with efficiency.

Last modified: 2014-06-17 22:12:50