Research Article | Open Access | Download PDF
Volume 4 | Issue 4 | Year 2013 | Article Id. IJCTT-V4I4P141 | DOI : https://doi.org/10.14445/22312803/IJCTT-V4I4P141
Prevention Proposals for Threats in Internet Services
L.V.N.Durgamani, M.Nalinisri, V.Samson Devakumar
Citation :
L.V.N.Durgamani, M.Nalinisri, V.Samson Devakumar, "Prevention Proposals for Threats in Internet Services," International Journal of Computer Trends and Technology (IJCTT), vol. 4, no. 4, pp. 646-650, 2013. Crossref, https://doi.org/10.14445/22312803/IJCTT-V4I4P141
Abstract
The explosion of the public Internet and e-commerce, private computers, and computer networks, if not adequately secured, are increasingly vulnerable to damaging attacks. Hackers, viruses, vindictive employees and even human error all represent clear and present dangers to networks. Loss of irreplaceable data is a very real threat for any business owner whose network connects to the outside world. Remote access for employees and connection to the Internet may improve communication in ways you’ve hardly imagined. Access to the Internet can open the world to communicating with customers and vendors, and is an immense source of information. But these same opportunities open a local area network (LAN) to the possibility of attack by thieves and vandals.
Keywords
Firewall, Security, Cryptography, Honey pots.
References
[1] The Complete Reference-NETWORK SECURITY Roberta Bragg, Mark Rhodes-ousley, Keith Strassberg..
[2] CISSP Boxed Set,(2nd Edition) Shon Harris.Tavel, P. 2007 Modeling and Simulation Design. AK Peters Ltd.
[3] Network Security A Beginner;s Guide(3rd Edition) Eric Maiwald.
[4] http://www.boingboing.net/2009/09/02/Networksecurity-skep.html.
[5] The benefits of Network Security, Sina Science and Technology,http://www.honeypotschina.cn/Article/jh/2 00811/218.html, November 13, 2008
[6] K. Seifried. Honeypotting with VMware basics. http://www.seifried.org/security/index.php/ Honeypotting With VMWare Basics, 2002.
[7] P. Vixie, S. Thomson, Y. Rekhter, and J. Bound. Dynamic updates in the domain name system (DNS update). http://www.ietf.org/rfc/rfc2136.txt, 1997.
[8] C. C. Zou, D. Towsley, andW. Gong. On the performance of Internet worm scanning strategies. Journal of Performance Evaluation, to appear.
[9] E. Cooke, F. Jahanian, and D. McPherson. The zombie roundup: Understanding, detecting, and disrupting botnets. In Proceedings of SRUTI: Steps to Reducing Unwanted Traffic on the Internet, July 2005.
[10] G. Bertoni, J. Daemen, M. Peeters and G. Van Assche, The Keccak Sponge Function Family, May 2011.
[11] Cryptographic sponge functions, January 2011, http://sponge.noekeon.org/.