Introduction to Network Security

Author(s):  
C. V. Anchugam ◽  
K. Thangadurai

Writing a chapter on network security is something like writing a brief introduction to flying a commercial airliner. Dissimilar, data communications of the past, today's networks incorporate varied devices that handle the data because it passes from the sender to the receiver. The first question to address is what we mean “network security”. Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. A generic definition of security is “freedom from risk or danger and safety”. However it is not only human errors that can cause problem to network security, problems can also be caused by natural forces like fire breakouts, earthquakes, floods lightning etc. The ways network administrators think about securing networks has been changed by an increasingly dynamic and technically challenging risk environment. Security is an assessment of risk. Secure environments are designed and developed through an intentional effort.

Author(s):  
C. V. Anchugam ◽  
K. Thangadurai

Writing a chapter on network security is something like writing a brief introduction to flying a commercial airliner. Dissimilar, data communications of the past, today's networks incorporate varied devices that handle the data because it passes from the sender to the receiver. The first question to address is what we mean “network security”. Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. A generic definition of security is “freedom from risk or danger and safety”. However it is not only human errors that can cause problem to network security, problems can also be caused by natural forces like fire breakouts, earthquakes, floods lightning etc. The ways network administrators think about securing networks has been changed by an increasingly dynamic and technically challenging risk environment. Security is an assessment of risk. Secure environments are designed and developed through an intentional effort.


2018 ◽  
Vol 7 (2) ◽  
pp. 61-67
Author(s):  
Iga Revva Princiss Jeinever

Computer networks are basically not safe to access freely. Security gaps in the network can be seen by irresponsible people with various techniques. Opening a port for access carries a high risk of being attacked by an attacker. In this connection, network administrators are required to work more to be able to secure the computer network they manage. One form of network security that is often used by network administrators in server management is through remote login such as ports on telnet, SSH, etc. A port that is always open is a network security hole that can be used by people who are not responsible for logging into the server. Focusing on these problems, in this study, Random Port Knocking is the right way and can be used to increase network security. With Random Port Knocking, the port will be opened as needed, the port will automatically change when it fails to log in more than three times and IP will automatically be blocked and access will not continue so that attacks on the network can be avoided and network security stability can be further improved. The final result of this research shows that the method applied in this research makes server safe. Because port randomization and IP block make irresponsible parties try harder to penetrate firewall walls.


Game Theory ◽  
2017 ◽  
pp. 369-382
Author(s):  
Sungwook Kim

Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. It involves the authorization of access to data in a network, which is controlled by the network administrator. Usually, network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies, and individuals. This chapter explores network security.


2014 ◽  
Vol 971-973 ◽  
pp. 1440-1443 ◽  
Author(s):  
Yan Kun Zhang

Networksecurity network system is presented, including hardware, software, and itstransmission in the network information security, network security threatsmainly include: software vulnerabilities, improper configuration, safetyconsciousness is not strong, virus, hacker attacks, etc. Is not only afirewall, network security is not anti-virus, intrusion monitoring, firewall,identity authentication, encryption, and other products of simple stack, butfrom the system to the application, from the device to the service ofrelatively complete, the system of the combination of security products.


Author(s):  
Oghenevwogaga Benson Adogbeji

The purpose of this chapter is to address the security breaches in cybercafés and also suggest measures of securing the unsecured computers. In order that cybercafés operate breach free Internet services, there is need for measures to be put in place to secure their network. This chapter of the book therefore unveils the security situation in cybercafés with the view to address network security, network breaches, and methods of protecting cybercafés’ systems. The chapter reveals some ways through which cybercafés encountered breaches such as Trojan horse programs, back door and remote administration programs, unauthorized access, denial of service, and so forth, and equally suggests measures of protecting the computers or networks such as installation of firewalls, use of antivirus, avoidance of opening unknown attachments, disabling of hidden filename extensions, keeping all applications parched, disconnecting from the net when not in use, regular backup of data, virtual private networks, and so forth.


2012 ◽  
Vol 605-607 ◽  
pp. 2387-2390
Author(s):  
Jing Chen

The rapid upgrading internet has brought to us many shortcuts and conveniences. Simultaneously, the underlying security problems have surfaced. These include unauthorized access, posing as legitimate users and destroyed data integrity, which interferes with the normal operation of the system. In addition, these computer network invasions are characterized by the focused attacking source, flexible attacking strategies and expanded scope of the attacked target. This paper analyzes the existing network security risks and means of invasion from various aspects; the network security defense measures are discussed here.


Author(s):  
Mehdi Moukhafi ◽  
Khalid El Yassini ◽  
Bri Seddik

<p><span>Computer network technologies are evolving fast and the development of internet technology is more quickly, people more aware of the importance of the network security. Network security is main issue of computing because the number attacks are continuously increasing. For these reasons, intrusion detection systems (IDSs) have emerged as a group of methods that combats the unauthorized use of a network’s resources. Recent advances in information technology, specially in data mining, have produced a wide variety of machine learning methods, which can be integrated into an IDS. This study proposes a new method of intrusion detection that uses support vector machine optimizing optimizing by a genetic algorithm. to improve the efficiency of detecting known and unknown attacks, we used a Particle Swarm Optimization algorithm to select the most influential features for learning the classification model.</span></p>


Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. It involves the authorization of access to data in a network, which is controlled by the network administrator. Usually, network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies, and individuals. This chapter explores network security.


2014 ◽  
Vol 556-562 ◽  
pp. 5765-5770
Author(s):  
Yan Li Lv ◽  
Yuan Long Li ◽  
Shuang Xiang ◽  
Chun He Xia

Network Security Logs are the records of the important activities and changes of the network, which not only records the state changes of network or mainframe at any time, but also provides the data bases for the network administrators to conduct network management. How to obtain the effective information of security events from the logs with different formats, thus realizing the detection, analysis and evaluation of the security events, has always been the key point to improve the important content of information security protection and focused on by the network administrators. The paper presents a kind of descriptive language of computer network security focusing on the log management, which realizes the uniform description of the common logs in the network with its effectiveness being verified in the actual network environment. It provides the infrastructural support to improve the early warning capacity towards the information security events.


2014 ◽  
Vol 556-562 ◽  
pp. 5312-5315 ◽  
Author(s):  
Abasi

With the rapid development of computer technology and communication technology, user demand more and more and with the application of computer network becoming more and more widely, its scale is becoming increasingly big. But on the other hand, there are so many network security events and the traditional single defense equipment or testing equipment has been unable to meet the demand of security; computer network is faced with severe situation of the information security. Network security situation assessment technology can reflect on the whole dynamic network security situation, and give early warning to its development trend by comprehensively considering various security factors. Therefore, the network security situation assessment model and key technology has become the hot topic of research in the field of network security.


Sign in / Sign up

Export Citation Format

Share Document