Security of the Network Based on Duration of Attacks

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395 -0056

Volume: 04 Issue: 04 | Apr -2017

p-ISSN: 2395-0072

www.irjet.net

SECURITY OF THE NETWORK BASED ON DURATION OF ATTACKS Sneha Vinod Kumar, Yashashwini V, Anusha Pai G, Dr.Yuvaraju B.N snehavinokumar@gmail.com pravesaya@gmail.com anushapaig@gmail.com yuvarajubn@gmail.com Department of CSE, NIE Mysore. ---------------------------------------------------------------------***--------------------------------------------------------------------of the attackers’ algorithm, defects in the design of the Abstract - The growth of the computer networks and internet demands a high level of security against the network and even poor understanding or knowledge unauthorized access and invasion. Though there are many about attacking tools and software algorithms. Before tools and softwares to check the security, in this paper, we try these weaknesses are found out by the attackers, the to alert the administrator about the attack considering time administrators must analyze and tighten the security. as one of the most important aspects. All this is done in the physical layer. This method initially monitors the network, One way of preventing defects is to perform multiple captures the packets on the network. In the next step data is tests and estimate different methodologies before the extracted, parsed and then based on the duration of attack, an actual implementation of the design. alert is made to the administrator or system. This method is not enough to judge the total criteria of network security but it does cover one of the major aspects of security i.e. time. It is expected that these methods can be used as a base for further experiments and enhancements to build a stronger security against attacks.

Yes of course, attacks are always complex in nature and guessing the exact method for preventing it is quite complex too though comparing it with different attacking algorithms may give us an idea in finding out an appropriate method sometimes.

Key Words: Network security, Duration of attack, Data extraction, Packet sniffing, Flood attack.

Although intruders may obtain complex tools and software algorithms and high knowledge about the network structures for attacking, one of the most important concepts during attacking is time, because these complex tools and softwares take time to run their algorithms [2].

1. INTRODUCTION Since the growth of computer networking, internet related activities etc. are having a rapid growth in today’s world. It is always not a safe place to store or transmit important data through the internet as there may be malicious attacks that affect our data or disturb the system’s functionality. One such type of attacks can be grouped as the cyber-attacks which is a major issue in the field of networks [1]. Another way in which the attacks are found is by using different kinds of tools and softwares that causes threat to the network. These tools are designed in such a way that they are launched to capture, visualize and find defects in different fields with respect to their requirements and goals.

In this paper, we present a new method of looking into these complex algorithms. Even though algorithms and their tools change according to the latest design modules or structures of networks the only concept that remains the same is time. This is done using the physical layer. Initially, monitoring is done on the network and packets are captured accordingly. The information is extracted from each of these packets and parsed accordingly. A list is maintained depending on

The main cause that allows the scope of unauthorized access and threats, solely depend upon the complexity © 2017, IRJET

|

Impact Factor value: 5.181

|

ISO 9001:2008 Certified Journal

| Page 2315


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.