An Overview of Security Mechanisms Towards Different Types of Attacks
Keywords:
Attacks, Network Security, Cloud-Environment SecurityAbstract
Protection is a basic part in the computing and also networking innovation. The most importantly point of every network making, planning, structure, and operating a network is the significance of a solid safety and security plan. Network safety has come to be more important to desktop computer customers, organizations, and also the armed force. With the development of the internet, safety and security became a major issue. The internet framework itself permitted numerous security threats to occur. Network safety is becoming of terrific significance because of copyright that can be conveniently acquired through the internet. There is various type of attack that can be when sent out across the network by understanding the attack approaches, enables the appropriate safety to emerge. Several organizations secure themselves from the internet using firewalls and encryption devices. There is a large amount of individual, industrial, army, and government information on networking frameworks worldwide and all of these needed different safety systems. In this paper, we are attempting to study most different sort of attacks along with numerous different sort of protection device that can be applied according to the need and architecture of the network.
References
- A White Paper, Securing the Intelligent Network, powered by Intelcorporation. Network Security Online available: http://en.wikipedia.org/wiki/Network_security.
- Network Security: History, Importance, and Future, University of Florida Department of Electrical and Computer Engineering, Bhavya Daya.
- Ateeq Ahmad, ?Type of Security Threats and its Prevention”, Ateeq Ahmad, Int.J.Computer Technology & Applications, Vol 3 (2),750-752.
- Wright, Joe; Jim Harmening (2009) "15" Computer and Information Security Handbook Morgan Kaufmann Publications Elsevier Inc p.257
- Dr. G. Padmavathi, Mrs. D. Shanmugapriya, ?A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks, (IJCSIS) International Journal of Computer Science and Information Security,Vol. 4, No. 1 & 2, 2009.
- Network Security Types of attacks Online available: http://computernetworkingnotes.com/networ k-security-access-lists-standards-and- extended/types-of-attack.html.
- Adeyinka, O., "Internet Attack Methods and Internet Security Technology," Modeling & Simulation, 2008. AICMS 08. Second Asia International Conference on, vol., no., pp.77?82, 13?15 May2008.
- Ajmera Rajesh, Siripuri Kiran, " Anomaly Detection Using Data Mining Techniques in Social Networking" in “International Journal for Research in Applied Science and Engineering Technology”, Volume-6, Issue-II, February 2018, 1268-1272 ISSN : 2321-9653 , www.ijraset.com
- Sugandhi Maheshwaram , “An Overview of Open Research Issues in Big Data Analytics” in “Journal of Advances in Science and Technology”, Vol. 14, Issue No. 2, September-2017 ISSN : 2230-9659
- Suresh Kumar Mandala, Neelima Gurrapu, Mahipal Reddy Pulyala, “ A Study on the Development of Machine Learing in Health Analysis”, Indian Journal of Public Health Research & Development, volume 9, Number 12, December 2018, ISSN-0976-0245(Print)-ISSN-0976-5506 (Electronic)
- Suresh Kumar Mandala,Mahipal Reddy Pulyala and Sanjay Pachouri, “Being a Smart Sapien with Information Centric Networking and Cloud Computing”, International Journal of Pure and Applied Mathematics,Volume 117, No. 21, 2017, 243-255,ISSN: 1311-8080 (printed version)
- Suresh Kumar Mandala, Sanjay Pachouri, “performance evaluation of multi stage attacks prediction”, Journal of Advanced Research in Dynamical and Control Systems, Vol. 9, September 2017, JARDCS Special Issue On Engineering Technology.
- Thota Mounika, Mandala Suresh kumar, “Document Proximity: Keyword Query Suggestion Based On User Location”, International Journal of Research, Volume 04, Issue 14, November 2017, e-ISSN: 2348-6848 ,p-ISSN: 2348-795X .
- Syeda Sobia Farees , M. Suresh Kumar, “A Novel Approach for Protecting Location Information in Geosocial Applications “, IJIEMR, Vol 1, Issue 2, November 2016 ISSN:2456-5083
- Suresh Kumar Mandala,Sanjay Pachouri, “A Reviewed Study on Financial Cyber Crime and Frauds”, International Journal of Advances in Arts, Sciences and Engineering(ijoaase.com), Volume 4 Issue 9, Sep 2016, ISSN. 2320-6144 (Online)
- Siripuri Kiran, Ajmera Rajesh, “A Study on Mining Top Utility Itemsets In A Single Phase” in “International Journal for Science and Advance Research in Technology (IJSART)”, Volume-4, Issue-2, February-2018, 637-642, ISSN(ONLINE): 2395-1052
- Yeshwanth Rao Bhandayker, “Security Mechanisms for Providing Security to the Network” in “International Journal of Information Technology and Management”, Vol. 12, Issue No. 1, February-2017, ISSN : 2249-4510
- Sugandhi Maheshwaram, S. Shoban Babu , “An Overview towards the Techniques of Data Mining” in “RESEARCH REVIEW International Journal of Multidisciplinary”, Volume-04, Issue-02, February-2019 ISSN : 2455-3085
- Yeshwanth Rao Bhandayker , “A Study on the Research Challenges and Trends of Cloud Computing” in “RESEARCH REVIEW International Journal of Multidisciplinary ”, Volume-04, Issue-02, February-2019 ISSN : 2455-3085
- Sriramoju Ajay Babu, Dr. S. Shoban Babu, “Improving Quality of Content Based Image Retrieval with Graph Based Ranking” in “International Journal of Research and Applications”, Volume 1, Issue 1, Jan-Mar 2014 ISSN : 2349-0020
- Dr. Shoban Babu Sriramoju, Ramesh Gadde, “A Ranking Model Framework for Multiple Vertical Search Domains” in “International Journal of Research and Applications” Vol 1, Issue 1,Jan-Mar 2014 ISSN : 2349-0020 .
- Mounika Reddy, Avula Deepak, Ekkati Kalyani Dharavath, Kranthi Gande, Shoban Sriramoju, “Risk-Aware Response Answer for Mitigating Painter Routing Attacks” in “International Journal of Information Technology and Management”, Volume VI, Issue I, Feb 2014 ISSN : 2249-4510
- Sugandhi Maheshwaram, “A Review on Deep Convolutional Neural Network and its Applications” in “International Journal of Advanced Research in Computer and Communication Engineering”, Vol. 8, Issue No. 2, February-2019 ISSN : 2278-1021 , DOI 10.17148/IJARCCE.2019.8230
- Yeshwanth Rao Bhandayker. "An Overview : Security Solutions for Cloud Environment." International Journal for Scientific Research and Development 7.2 (2019): 1596-1598.
- Yeshwanth Rao Bhandayker. "AN OVERIEW OF CYBER SECURITY", International Journal of Research, vol. 8, Issue. 3 (2019): 2236-6124.
- Sugandhi Maheshwaram, "A STUDY ON THE CHALLENGES IN HANDLING BIG DATA", International Journal of Research, vol. 8, Issue. 3 (2019): 2236-6124.
- Yeshwanth Rao Bhandayker. "An Overview of Service Models and Cloud Computing Evolution in IT", International Journal of Research and Applications, vol. 5, Issue. 20, Oct - Dec 2018 Transactions 5(20) : 1000-1004. ISSN : 2349 – 0020
- Yeshwanth Rao Bhandayker. "A Comprehensive Survey on Security Issues and Advantages towards Cloud Computing", International Journal of Research and Applications, vol. 5, Issue. 18,Apr - Jun 2018 Transactions 5(18): 801-807. ISSN : 2349 – 0020
- Sugandhi Maheshwaram, . "A Study on Security Information and Event Management (SIEM)", International Journal of Research and Applications, vol. 5, Issue. 17, Jan - Mar 2018 Transactions 5(17): 705-708. ISSN : 2349 – 0020
- Sugandhi Maheshwaram, . "A Novel Technique for Preventing the SQL Injection Vulnerabilities", International Journal of Research and Applications, vol. 5, Issue. 19, July - Sep 2018 Transactions 5(19): 901-909. ISSN : 2349 – 0020
- Shoban Babu Sriramoju, "Substantial Overall Performance Pattern-matching Algorithm for Network Stability", International Journal of Research and Applications, vol. 5, Issue. 17, Jan - Mar 2018 Transactions 5(17): 701-704. ISSN : 2349 – 0020
- Sugandhi Maheshwaram. "A Study Design of Big Data by Concentrating on the Atmospheric Information Evaluation." International Journal for Scientific Research and Development 7.3 (2019): 233-236.
- Suresh Kumar Mandala,Sanjay Pachouri, “Analytical Study for Intrusion Detection System to Detect Cyber Attack”, Airo International Research Journal, Volume VII, March 2016 ISSN: 2320-3714
- Ranjeeth kumar.M, M.Suresh Kumar, S.S.V.N Sarma, “FUZZY KEYWORD SEARCH IN XML DATA”, International Journal of Scientific & Engineering Research, Volume 4, Issue 6, June 2013 ISSN : 2229-5518
- Yeshwanth Rao Bhandayker, “AN OVERVIEW OF THEINTEGRATION OF ALL DATA MINING AT CLOUD-COMPUTING” in “Airo International Research Journal”, Volume XVI, June 2018 ISSN : 2320-3714
- Siripuri Kiran, 'Decision Tree Analysis Tool with the Design Approach of Probability Density Function towards Uncertain Data Classification', International Journal of Scientific Research in Science and Technology(IJSRST), Print ISSN : 2395-6011, Online ISSN : 2395-602X,Volume 4 Issue 2, pp.829-831, January-February 2018. URL : http://ijsrst.com/IJSRST1841198
- Yeshwanth Rao Bhandayker , “Artificial Intelligence and Big Data for Computer Cyber Security Systems” in “Journal of Advances in Science and Technology”, Vol. 12, Issue No. 24, November-2016 ISSN : 2230-9659
- Sugandhi Maheshwaram, “A Comprehensive Review on the Implementation of Big Data Solutions” in “International Journal of Information Technology and Management”, Vol. XI, Issue No. XVII, November-2016 ISSN : 2249-4510
Downloads
Published
Issue
Section
License
Copyright (c) IJSRST

This work is licensed under a Creative Commons Attribution 4.0 International License.