IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Framework for Threat Analysis and Attack Modelling of Network Security Protocols

Framework for Threat Analysis and Attack Modelling of Network Security Protocols
View Sample PDF
Author(s): Nachiket Athavale (Kashibai Navale College of Engineering, India), Shubham Deshpande (Kashibai Navale College of Engineering, India), Vikash Chaudhary (Kashibai Navale College of Engineering, India), Jatin Chavan (Kashibai Navale College of Engineering, India) and S. S. Barde (Kashibai Navale College of Engineering, India)
Copyright: 2020
Pages: 15
Source title: Securing the Internet of Things: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-5225-9866-4.ch007

Purchase

View Framework for Threat Analysis and Attack Modelling of Network Security Protocols on the publisher's website for pricing and purchasing information.

Abstract

Nowadays everything is computerized including banking and personal records. Also, to boost business profits, businessmen have changed their way of operations from physical way to electronic way, for example Flipkart. But as these developments benefit the developer they also increase the chance of exposing all of customer's personal details to malicious users. Hackers can enter into the system and can steal crucial or sensitive information about other authentic users and in case of banks leads to frauds. Security thus, becomes an important issue for all companies and banks. Intrusion detection systems help such companies by detecting in real time whether an intrusion is carried on or not. Here the authors are developing a signature based intrusion detection system which will scan incoming packets and send a warning message to system administrator. Also, the authors are implementing a framework and provide it to all the users so that developing intrusion detection based system similar to ours. The advantage of using framework is that it can be upgraded and re-defined whenever it is needed.

Related Content

Kijpokin Kasemsap. © 2020. 20 pages.
Tommy Prayoga, Juneman Abraham. © 2020. 25 pages.
Jasmine Norman, Paul Joseph. © 2020. 15 pages.
Sungwook Kim. © 2020. 9 pages.
Abhijeet Chandrakant Dabre, Sandesh Shivaji Mahamure, Snehal Pandurang Wadibhasme. © 2020. 22 pages.
Geogen G., Poovammal E.. © 2020. 17 pages.
Nachiket Athavale, Shubham Deshpande, Vikash Chaudhary, Jatin Chavan, S. S. Barde. © 2020. 15 pages.
Body Bottom