INVESTIGATION OF SECURITY OF NETWORK: A REVIEW

Authors

  • RAMESH KUMAR RESEARCH SCHOLAR

Keywords:

Security, Protocol

Abstract

In this paper the concept of security of network has been discussed. The main focus of this paper is to review the existing researches in field of network security. . Security of network is combining more than on layers of defense in network. Every Security of network layer is performing policies controls. The authorized users would be able to gain access to network resources but malicious actors may be blocked from performing threats related to exploits. Different mechanism proposed by different researchers is discussed in this paper. The scope of network security is also discussed at the end of research.

References

Bhawan Bhardwaj,2 Ankur Mittal, “ADVANCED MECHANISMS TO SECURE WIRELESS AD HOC NETWORK WITHPERFORMANCE ANALYSIS” ISSN: 2278-6848, Volume: 08 Issue: 08 ,October - December 2017

Shahriar Mohammadi, Reza Ebrahimi Atani, Hossein Jadidoleslamy, “A Comparison of Link Layer Attacks on Wireless Sensor Networks”, Journal of Information Security, April 2011, pp. 69-84.

Wajeb Gharibi, Maha Shaabi, “Cyber threats in social networking websites”, International Journal of Distributed & Parallel Systems (IJDPS), Vol.3, No.1, January 2012, pp. 119-126.

Rupam, Atul Verma, Ankita Singh, “An Approach to Detect Packets Using Packet Sniffing, International Journal of Computer Science & Engineering Survey (IJCSES) ,Vol.4, No.3, June 2013, pp.21-33.

Sharmin Rashid, Subhra Prosun Paul, “Proposed Methods of IP Spoofing Detection & Prevention, International”, Journal of Science & Research (IJSR), Volume 2, Issue 8, August 2013, pp.438-444.

Mohan V. Pawar, Anuradha J, “Security of network and Types of Attacks in Network”, International Conference on Intelligent Computing, Communication & Convergence, 2015, pp. 503 – 506.

MANJIRI N. MULEY, “ANALYSIS FOR EXPLORING THE SCOPE OF NETWORK SECURITY TECHNIQUES IN DIFFERENT ERA: A STUDY”, International Journal of Advanced Computational Engineering and Networking, Volume-3, Issue-12, Dec.-2015, pp. 33-36.

[Ankit Mehto, Prof. Hitesh Gupta, “A Review: Attacks and Its Solution over Mobile Ad-Hoc Network”, International Journal of Engineering Trends and Technology (IJETT), Volume 4, Issue 5, May 2013, pp. 2009-2011.

Ms.Neha KamdarAssistant Professor, Vinita Sharma Assistant Professor, Sudhanshu Nayak Assistant Professor, “A Survey paper on RFID Technology, its Applications and Classification of Security/Privacy Attacks and Solutions”, International Journal of Computer Science and Information Technology & Security (IJCSITS), Vol.6, No4, July-August 2016, pp.64-68.

P.ARUNA DEVI, S.RANI LASKHMI, K.SATHIYAVAISHNAVI, “A Study on Security of network Aspects and Attacking Methods”, International Journal of P2P Network Trends and Technology, Volume3, Issue2, 2013, pp. 97-103.

Mahendra Kumar, Ajay Bhushan, Amit Kumar, “A Study of wireless Ad-Hoc Network attack and Routing Protocol attack”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 4, April 2012, pp.31-33.

Downloads

Published

2018-09-30

How to Cite

KUMAR, R. (2018). INVESTIGATION OF SECURITY OF NETWORK: A REVIEW. Innovative Research Thoughts, 4(6), 1–7. Retrieved from https://irt.shodhsagar.com/index.php/j/article/view/942