A Study on Intrusion Prevention/Detection

Authors(2) :-Dr. Vinay Ranganathan, Ravikant S. B.

Today one of the most important challenges in communication is securities interior network. Understanding the basics of any technology is significant if ever aiming to totally perceive that technology. A good security answer not solely solves the protection perplexity, but also reduces the total cost of implementation and operation of the network. This paper highlights all the treads that have an effect on network security like legal problems, privacy concerns and people shortages. The eminent use of recent technologies needs associate hyperbolic have to be compelled to defend valuable data and network resources from corruption and intrusion. Now a day's anybody with a PC and an internet connection can download attacking tool and start attacking. These tools are commonly referred to as kiddle-scripts. Hackers are people who play around with software code in order to understand how it works. They might discover holes with in the systems and can oftenbe veryaltruistic. A crackeris one who breaks into or otherwise violates the system integrity of remote machines with malicious intent. As a result he gain unauthorized access and destroys very important data. There are many threats to port and protocols. Each attack has its characteristic and totally different handling to forestall system from them. There are several network security tools to facilitate network security like firewalls, proxy server, web contents filters and others. The paper gives all emphasis on the key elements of network security and its weaknesses.

Authors and Affiliations

Dr. Vinay Ranganathan
Professor, Charan's Degree College, Ulsoor, Bangalore, Karnataka, India
Ravikant S. B.
Assistant Professor, Charan's Degree College, Ulsoor, Bangalore, Karnataka, India

Network security, Data privacy, Security trends, Security goals, Hackers, Crackers.

  1. https://en.wikipedia.org/wiki/Intrusion_detection_system
  2. Data Protection Technical Guidance Note: (PET) Privacy enhancing technologies (ICO)
  3. https://searchsecurity.techtarget.com/definition/intrusion-detection-system
  4. http://www.legalserviceindia.com/articles/articles.html

Publication Details

Published in : Volume 4 | Issue 7 | September-October 2019
Date of Publication : 2019-10-12
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 32-37
Manuscript Number : CSEIT19476
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Dr. Vinay Ranganathan, Ravikant S. B., "A Study on Intrusion Prevention/Detection", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 7, pp.32-37, September-October-2019. |          | BibTeX | RIS | CSV

Article Preview