2014 International Conference on Reliability Optimization and Information Technology (ICROIT) 2014
DOI: 10.1109/icroit.2014.6798342
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing Network Security by implementing preventive mechanism using GNS3

Abstract: Due to rapid need of computer's in business and other organizations many networks has been established. In today scenario attacks on computer networks has increased to a great extend. Networks are very much needed but they are very prone to attacks because of security breaches & vulnerabilities in traditional establishments. There are many types of attacks which can be penetrated in our networks or edge devices; one of the most prone attack is the ICMP flood attack leading to denial of service. In this paper w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 5 publications
0
1
0
Order By: Relevance
“…A number of organizations have encountered network attacks initiated by malicious insiders; a trusted person from the organization is referred to as an insider. In case those malicious insiders are the ones who are initiating attacks, it will be troublesome to find them out because of the fact that insiders generally have knowledge about the security mechanisms of the organization's network (Kuldeep and Tyagi, 2014). A link-local DoS attack cannot be prevented with the utilization of encryption and integrity checks, which are commonly used to encounter attacks that take place outside the network.…”
Section: Attacker Usermentioning
confidence: 99%
“…A number of organizations have encountered network attacks initiated by malicious insiders; a trusted person from the organization is referred to as an insider. In case those malicious insiders are the ones who are initiating attacks, it will be troublesome to find them out because of the fact that insiders generally have knowledge about the security mechanisms of the organization's network (Kuldeep and Tyagi, 2014). A link-local DoS attack cannot be prevented with the utilization of encryption and integrity checks, which are commonly used to encounter attacks that take place outside the network.…”
Section: Attacker Usermentioning
confidence: 99%