Sharing of resources is the main concept of using computer networks which is group of computers connected together. The rapid development of communication and network technologies leads to improvement in security related issues. Two kinds of attackers are available that are commonly known as "insider" and "outsider". The insider attack is defined as the person who has full authorization for accessing the system can misuse the authentication for obtaining other system resources who has no authorization to access. The outsider attack is accessed from outside of the premises that are pertaining unauthorized access towards the system resources. Such examples for the outside attackers are organized criminals accessing through internet or some international terrorists or other governments [1].Two main components are consisted in computer networks and these are hardware and software. These components have its own vulnerabilities and different kinds of risk. The first component is hardware which several threats that can be detected easily and can rectify the errors since it affects the device parts rather than the data. *Author for correspondence Four types of hardware threats are available and these are Electrical, Maintenance, Physical, and Environmental. Whereas, the second component is software threat, here the main problem is that it affects data rather than the device which could be a huge loss and cannot recover that easily [2−5].In previous years, the expert in programming skills can only write programs for hacking the data and steal it. Nowadays, people having basic knowledge in programming are becoming hackers by just downloading hacking tools from the websites [6,7]. Furthermore, high featured software was used by the people due to its attracting application feature that makes attackers easily interfere into their system. Lack of security is dealt with using of high features into the system which are prone to attack easily. There are three main goals of software security threat and these are Integrity, Availability, and Confidentiality [3, 8−11].Three main contributions are concerned for contributing network security challenge. The first is the volume of network data that grow rapidly from years that is set to be continued. New techniques are required to deal with this data which analyze increasingly efficient, effective, and rapid manner. The second one is to improve accuracy and effectiveness by using granularity and in-depth
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.