An Overview of Security Mechanisms Towards Different Types of Attacks

Authors

  • Anusha Medavaka  Software Programmer, Seven Hills IT Solutions LLC, New Jersey

Keywords:

Attacks, Network Security, Cloud-Environment Security

Abstract

Protection is a basic part in the computing and also networking innovation. The most importantly point of every network making, planning, structure, and operating a network is the significance of a solid safety and security plan. Network safety has come to be more important to desktop computer customers, organizations, and also the armed force. With the development of the internet, safety and security became a major issue. The internet framework itself permitted numerous security threats to occur. Network safety is becoming of terrific significance because of copyright that can be conveniently acquired through the internet. There is various type of attack that can be when sent out across the network by understanding the attack approaches, enables the appropriate safety to emerge. Several organizations secure themselves from the internet using firewalls and encryption devices. There is a large amount of individual, industrial, army, and government information on networking frameworks worldwide and all of these needed different safety systems. In this paper, we are attempting to study most different sort of attacks along with numerous different sort of protection device that can be applied according to the need and architecture of the network.

References

  1. A White Paper, Securing the Intelligent Network, powered by Intelcorporation. Network Security Online available: http://en.wikipedia.org/wiki/Network_security.
  2. Network Security: History, Importance, and Future, University of Florida Department of Electrical and Computer Engineering, Bhavya Daya.
  3. Ateeq Ahmad, ?Type of Security Threats and its Prevention”, Ateeq Ahmad, Int.J.Computer Technology & Applications, Vol 3 (2),750-752.
  4. Wright, Joe; Jim Harmening (2009) "15" Computer and Information Security Handbook Morgan Kaufmann Publications Elsevier Inc p.257
  5. Dr. G. Padmavathi, Mrs. D. Shanmugapriya, ?A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks, (IJCSIS) International Journal of Computer Science and Information Security,Vol. 4, No. 1 & 2, 2009.
  6. Network Security Types of attacks Online available: http://computernetworkingnotes.com/networ k-security-access-lists-standards-and- extended/types-of-attack.html.
  7. Adeyinka, O., "Internet Attack Methods and Internet Security Technology," Modeling & Simulation, 2008. AICMS 08. Second Asia International Conference on, vol., no., pp.77?82, 13?15 May2008.
  8. Ajmera Rajesh, Siripuri Kiran, " Anomaly Detection Using Data Mining Techniques in Social Networking" in “International Journal for Research in Applied Science and Engineering Technology”, Volume-6, Issue-II, February 2018, 1268-1272 ISSN : 2321-9653 , www.ijraset.com
  9. Sugandhi Maheshwaram , “An Overview of Open Research Issues in Big Data Analytics” in “Journal of Advances in Science and Technology”, Vol. 14, Issue No. 2, September-2017 ISSN : 2230-9659
  10. Suresh Kumar Mandala, Neelima Gurrapu, Mahipal Reddy Pulyala, “ A Study on the Development of Machine Learing in Health Analysis”, Indian Journal of Public Health Research & Development, volume 9, Number 12, December 2018, ISSN-0976-0245(Print)-ISSN-0976-5506 (Electronic)
  11. Suresh Kumar Mandala,Mahipal Reddy Pulyala and Sanjay Pachouri, “Being a Smart Sapien with Information Centric Networking and Cloud Computing”, International Journal of Pure and Applied Mathematics,Volume 117, No. 21, 2017, 243-255,ISSN: 1311-8080 (printed version)
  12. Suresh Kumar Mandala, Sanjay Pachouri, “performance evaluation of multi stage attacks prediction”, Journal of Advanced Research in Dynamical and Control Systems, Vol. 9, September 2017, JARDCS Special Issue On Engineering Technology.
  13. Thota Mounika, Mandala Suresh kumar, “Document Proximity: Keyword Query Suggestion Based On User Location”, International Journal of Research, Volume 04, Issue 14, November 2017, e-ISSN: 2348-6848 ,p-ISSN: 2348-795X .
  14. Syeda Sobia Farees , M. Suresh Kumar, “A Novel Approach for Protecting Location Information in Geosocial Applications “, IJIEMR, Vol 1, Issue 2, November 2016 ISSN:2456-5083
  15. Suresh Kumar Mandala,Sanjay Pachouri, “A Reviewed Study on Financial Cyber Crime and Frauds”, International Journal of Advances in Arts, Sciences and Engineering(ijoaase.com), Volume 4 Issue 9, Sep 2016, ISSN. 2320-6144 (Online)
  16. Siripuri Kiran, Ajmera Rajesh, “A Study on Mining Top Utility Itemsets In A Single Phase” in “International Journal for Science and Advance Research in Technology (IJSART)”, Volume-4, Issue-2, February-2018, 637-642, ISSN(ONLINE): 2395-1052
  17. Yeshwanth Rao Bhandayker, “Security Mechanisms for Providing Security to the Network” in “International Journal of Information Technology and Management”, Vol. 12, Issue No. 1, February-2017, ISSN : 2249-4510
  18. Sugandhi Maheshwaram, S. Shoban Babu , “An Overview towards the Techniques of Data Mining” in “RESEARCH REVIEW International Journal of Multidisciplinary”, Volume-04, Issue-02, February-2019 ISSN : 2455-3085
  19. Yeshwanth Rao Bhandayker , “A Study on the Research Challenges and Trends of Cloud Computing” in “RESEARCH REVIEW International Journal of Multidisciplinary ”, Volume-04, Issue-02, February-2019 ISSN : 2455-3085
  20. Sriramoju Ajay Babu, Dr. S. Shoban Babu, “Improving Quality of Content Based Image Retrieval with Graph Based Ranking” in “International Journal of Research and Applications”, Volume 1, Issue 1, Jan-Mar 2014 ISSN : 2349-0020
  21. Dr. Shoban Babu Sriramoju, Ramesh Gadde, “A Ranking Model Framework for Multiple Vertical Search Domains” in “International Journal of Research and Applications” Vol 1, Issue 1,Jan-Mar 2014 ISSN : 2349-0020 .
  22. Mounika Reddy, Avula Deepak, Ekkati Kalyani Dharavath, Kranthi Gande, Shoban Sriramoju, “Risk-Aware Response Answer for Mitigating Painter Routing Attacks” in “International Journal of Information Technology and Management”, Volume VI, Issue I, Feb 2014 ISSN : 2249-4510
  23. Sugandhi Maheshwaram, “A Review on Deep Convolutional Neural Network and its Applications” in “International Journal of Advanced Research in Computer and Communication Engineering”, Vol. 8, Issue No. 2, February-2019 ISSN : 2278-1021 , DOI 10.17148/IJARCCE.2019.8230
  24. Yeshwanth Rao Bhandayker. "An Overview : Security Solutions for Cloud Environment." International Journal for Scientific Research and Development 7.2 (2019): 1596-1598.
  25. Yeshwanth Rao Bhandayker. "AN OVERIEW OF CYBER SECURITY", International Journal of Research, vol. 8, Issue. 3 (2019): 2236-6124.
  26. Sugandhi Maheshwaram, "A STUDY ON THE CHALLENGES IN HANDLING BIG DATA", International Journal of Research, vol. 8, Issue. 3 (2019): 2236-6124.
  27. Yeshwanth Rao Bhandayker. "An Overview of Service Models and Cloud Computing Evolution in IT", International Journal of Research and Applications, vol. 5, Issue. 20, Oct - Dec 2018 Transactions 5(20) : 1000-1004. ISSN : 2349 – 0020
  28. Yeshwanth Rao Bhandayker. "A Comprehensive Survey on Security Issues and Advantages towards Cloud Computing", International Journal of Research and Applications, vol. 5, Issue. 18,Apr - Jun 2018 Transactions 5(18): 801-807. ISSN : 2349 – 0020
  29. Sugandhi Maheshwaram, . "A Study on Security Information and Event Management (SIEM)", International Journal of Research and Applications, vol. 5, Issue. 17, Jan - Mar 2018 Transactions 5(17): 705-708. ISSN : 2349 – 0020
  30. Sugandhi Maheshwaram, . "A Novel Technique for Preventing the SQL Injection Vulnerabilities", International Journal of Research and Applications, vol. 5, Issue. 19, July - Sep 2018 Transactions 5(19): 901-909. ISSN : 2349 – 0020
  31. Shoban Babu Sriramoju, "Substantial Overall Performance Pattern-matching Algorithm for Network Stability", International Journal of Research and Applications, vol. 5, Issue. 17, Jan - Mar 2018 Transactions 5(17): 701-704. ISSN : 2349 – 0020
  32. Sugandhi Maheshwaram. "A Study Design of Big Data by Concentrating on the Atmospheric Information Evaluation." International Journal for Scientific Research and Development 7.3 (2019): 233-236.
  33. Suresh Kumar Mandala,Sanjay Pachouri, “Analytical Study for Intrusion Detection System to Detect Cyber Attack”, Airo International Research Journal, Volume VII, March 2016 ISSN: 2320-3714
  34. Ranjeeth kumar.M, M.Suresh Kumar, S.S.V.N Sarma, “FUZZY KEYWORD SEARCH IN XML DATA”, International Journal of Scientific & Engineering Research, Volume 4, Issue 6, June 2013 ISSN : 2229-5518
  35. Yeshwanth Rao Bhandayker, “AN OVERVIEW OF THEINTEGRATION OF ALL DATA MINING AT CLOUD-COMPUTING” in “Airo International Research Journal”, Volume XVI, June 2018 ISSN : 2320-3714
  36. Siripuri Kiran, 'Decision Tree Analysis Tool with the Design Approach of Probability Density Function towards Uncertain Data Classification', International Journal of Scientific Research in Science and Technology(IJSRST), Print ISSN : 2395-6011, Online ISSN : 2395-602X,Volume 4 Issue 2, pp.829-831, January-February 2018. URL : http://ijsrst.com/IJSRST1841198
  37. Yeshwanth Rao Bhandayker , “Artificial Intelligence and Big Data for Computer Cyber Security Systems” in “Journal of Advances in Science and Technology”, Vol. 12, Issue No. 24, November-2016 ISSN : 2230-9659
  38. Sugandhi Maheshwaram, “A Comprehensive Review on the Implementation of Big Data Solutions” in “International Journal of Information Technology and Management”, Vol. XI, Issue No. XVII, November-2016 ISSN : 2249-4510

Downloads

Published

2018-10-30

Issue

Section

Research Articles

How to Cite

[1]
Anusha Medavaka, " An Overview of Security Mechanisms Towards Different Types of Attacks, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 4, Issue 10, pp.441-450, September-October-2018.