Network Attacks and Intrusion Detection System: A Brief

被引:0
|
作者
Sharma, Neha V. [1 ]
Kavita [1 ]
Agarwal, Gaurav [1 ]
机构
[1] Manipal Univ Jaipur, Jaipur, Rajasthan, India
关键词
Network Security; Network attacks; Internet services; IDS;
D O I
10.1109/icct46177.2019.8969033
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Security of a network has got a major importance in a wide range of systems. These days every place is connected to a network or via a network e.g. hospitals, offices, universities, finance sector etc. and almost everyone whether young or old is connected to social networking and community media. Though many systems are there that can secure any network, this attacking phenomenon keeps on increasing day by day. This paper focusses on some fundamentals like what basically a network attack is, how to prevent it, its types, preventive measures and current procedures that are focusing on this paradigm. Basically this paper is an attempt to help people understand the concept of attacks so as to avoid them.
引用
收藏
页码:280 / 283
页数:4
相关论文
共 50 条
  • [21] Using Attacks Ontology in Distributed Intrusion Detection System
    Abdoli, F.
    Kahani, M.
    ADVANCES IN COMPUTER AND INFORMATIOM SCIENCES AND ENGINEERING, 2008, : 153 - +
  • [22] An Active Intrusion Detection System for LAN Specific Attacks
    Hubballi, Neminath
    Roopa, S.
    Ratti, Ritesh
    Barbhuiya, F. A.
    Biswas, Santosh
    Sur, Arijit
    Nandi, Sukumar
    Ramachandran, Vivek
    ADVANCES IN COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2010, 6059 : 129 - 142
  • [23] A Fuzzy Intrusion Detection System Based on Categorization of Attacks
    Varshovi, Ali
    Rostamipour, Maryam
    Sadeghiyan, Babak
    2014 6TH CONFERENCE ON INFORMATION AND KNOWLEDGE TECHNOLOGY (IKT), 2014, : 50 - 55
  • [24] An Enhanced Intrusion Detection System for Routing Attacks in MANET
    Abirami, K. Rama
    Sumithra, M. G.
    Rajasekaran, J.
    PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS), 2013,
  • [25] Response option for attacks detected by Intrusion Detection System
    Anwar, Shahid
    Zain, Jasni Muhamad
    Zolkipli, Mohamad Fadli
    Inayat, Zakira
    Jabir, Aws Naser
    Odili, Julius Beneoluchi
    2015 4TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND COMPUTER SYSTEMS (ICSECS), 2015, : 195 - 200
  • [26] Recurrent network in Network Intrusion Detection System
    Xue, JS
    Sun, JZ
    Zhang, X
    PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 2676 - 2679
  • [27] Investigating the practicality of adversarial evasion attacks on network intrusion detection
    Merzouk, Mohamed Amine
    Cuppens, Frederic
    Boulahia-Cuppens, Nora
    Yaich, Reda
    ANNALS OF TELECOMMUNICATIONS, 2022, 77 (11-12) : 763 - 775
  • [28] Network Intrusion Detection with Fuzzy Genetic Algorithm for Unknown Attacks
    Jongsuebsuk, P.
    Wattanapongsakorn, N.
    Charnsripinyo, C.
    2013 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2013,
  • [29] On Generating Network Traffic Datasets with Synthetic Attacks for Intrusion Detection
    Cordero, Carlos Garcia
    Vasilomanolakis, Emmanouil
    Wainakh, Aidmar
    Muhlhauser, Max
    Nadjm-Tehrani, Simin
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2021, 24 (02)
  • [30] The sound of intrusion: A novel network intrusion detection system
    Aldarwbi, Mohammed Y.
    Lashkari, Arash H.
    Ghorbani, Ali A.
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 104