0% found this document useful (0 votes)
28 views5 pages

Network Security-Research Paper

Uploaded by

Abhi Chauhan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views5 pages

Network Security-Research Paper

Uploaded by

Abhi Chauhan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Network Security

By:-
• Abhishek Chauhan
• Alok Kumawat
28/03/2024
Abstract:
Network security has become increasingly crucial for individuals, organizations,
and the military due to the rise of the internet. Understanding the historical
development of security technology is essential in comprehending its emergence.
The internet's architecture inherently exposes it to various security threats, but
modifying this structure can mitigate potential attacks. Businesses often safeguard
themselves using firewalls and encryption on their intranets, ensuring connectivity
with the internet while remaining shielded from threats. The field of network
security continues to evolve, with ongoing research focusing on internet
vulnerabilities, attack methods, and security technology. Background knowledge
of these areas is essential for understanding current research in the field.
Keywords:
Network Security, Technology, Strategies, PrincipleData Security, Internet
Architecture, IPv4.
INTRODUCTION:
The increasing interconnectedness facilitated by the internet and networking
technologies underscores the importance of network security, particularly in
safeguarding personal, commercial, military, and governmental information from
potential breaches. With the ease of accessing intellectual property online, the risk
of breaches is heightened. Two primary network types, data networks and
synchronous networks, exhibit distinct vulnerabilities, with the former, exemplified
by the internet, susceptible to attacks due to computer-based routers. Conversely,
synchronous networks, characterized by switches, are less vulnerable.
Consequently, emphasis on security is paramount in data networks, especially
those connected to the internet. The expansive realm of network security
encompasses research into internet architecture vulnerabilities, types of internet
attacks and security measures, security protocols for networks with internet access,
and advancements in network security hardware and software.
PROBLEM STATEMENT:
1. "An Investigation into Vulnerability Assessment Techniques for Enhancing
Network Security."
2. "Exploring the Impact of Insider Threats on Network Security: A
Comprehensive Analysis."
3. "Assessing the Effectiveness of Machine Learning Algorithms in Intrusion
Detection Systems for Network Security."
4. "Investigating the Role of Blockchain Technology in Enhancing Network
Security Protocols."
5. "Addressing the Challenges of IoT Security in Network Infrastructure: A
Comparative Study."
6. "Understanding the Threat Landscape of DDoS Attacks and Mitigation
Strategies in Network Security."
7. "An Examination of Zero-Day Exploits and Their Implications on Network
Security Measures."
8. "Analyzing the Effectiveness of Encryption Techniques in Safeguarding Data
Transmission for Network Security."
9. "Exploring the Role of Artificial Intelligence in Predictive Analysis for Network
Security Threats."
10. "Investigating the Emerging Trends in Network Security Policies and
Compliance Frameworks."
LITERATURE REVIEW:
INTERNET ARCHITECTURE AND VULNERABLE
SECURITY ASPECTS
Organizations are increasingly turning to secure private networks or intranets
due to concerns about internet security breaches. The Internet Engineering Task
Force (IETF) has implemented security measures across various layers of the
Internet Protocol Suite, offering logical protection for transferred data units.
Analysis of both current and upcoming versions of the Internet Protocol
assesses their security implications, acknowledging that while some security
exists within the protocol, not all attacks are effectively guarded against. The IP
Security architecture standardizes internet security, encompassing both IPv4 and
IPv6. Despite advancements like IPsec, designed to address internet
vulnerabilities, they may not fully mitigate all threats.

IP sec is a point‐to‐point protocol, one side encrypts, the other decrypts and
both sides share key or keys. IPsec can be used in two modes, namely transport
mode and tunnel modes.

ATTACKS THROUGH THE CURRENT INTERNET


PROTOCOL IPV4
Business leaders face mounting pressure to secure access to company resources
amidst regulatory and organizational demands. IAM simplifies access
management and auditing, offering capabilities like biometrics and AI to meet
evolving security needs. It aligns with the shift to a zero-trust paradigm and
addresses IoT security requirements, catering to businesses of all sizes.
1. Common Internet Attack Method
Common internet attacks methods are broken down into categories. Some
attacks gain system knowledge or personal information, such as eaves dropping
and phishing. Attacks can also interfere with the system’s intended function,
such as viruses, worms and trojans. The other form of attack is when the
system’s resources are consumes uselessly, these can be caused by denial of
service (DoS) attack. Other forms of network intrusions also exist, such as land
attacks, surf attacks, and teardrop attacks. These attacks are not as well-known
as DoS attacks, but they are used in some form or another even if they
aren’t mentioned by name.
1.1 Eavesdropping
Eavesdropping involves an unauthorized party intercepting communications,
with passive eavesdropping being secretive listening and active eavesdropping
involving listening and potentially inserting content into the communication
stream, leading to message distortion and potential theft of sensitive
information.
1.2 Viruses
Viruses are self-replicating programs that rely on files to spread, activating
within a system upon file execution.
1.3 Worms
Worms, like viruses, self-replicate, but unlike viruses, they don't need files to
spread. They come in two main types: mass-mailing worms, which use email to
infect other computers, and network-aware worms, which target specific hosts.
Network-aware worms are particularly troublesome for the Internet as they
select targets and infect them, potentially using Trojans to do so.
1.4 Trojans
Trojans are seemingly harmless programs that deceive users but harbor
malicious intent, often carrying payloads like viruses.
1.5 Phishing
Phishing is the fraudulent practice of attempting to obtain sensitive information,
like credit card numbers or online banking credentials, from individuals,
groups, or organizations through deception, where phishers deceive users into
disclosing personal data.
1.6 IP Spoofing Attacks
Spoofing involves impersonating a trusted computer's address to gain
unauthorized access to other computers, concealing the intruder's identity and
complicating detection and prevention efforts. Current IP protocol technology is
unable to completely eliminate spoofed packets.
1.7 Denial of Service
Denial of Service (DoS) is an attack where a system overwhelmed by excessive
requests is unable to respond to legitimate ones. As a result, the system
consumes resources while waiting for handshakes to complete, ultimately
rendering it incapable of fulfilling further requests, leading to service
unavailability.
2. Technology for Internet Security
As long as information remains accessible and transferable across the Internet,
internet threats will persist as a significant global issue. To address these threats,
various defense and detection mechanisms have been developed.
2.1 Cryptographic systems
Cryptography, an essential tool in modern security engineering, employs codes
and ciphers to convert information into unintelligible data, ensuring safe
transmission across networks.
2.2 Firewall
A firewall serves as a border control mechanism, designed to block both
incoming and outgoing traffic to protect a private network from unauthorized
access. It acts as the frontline defense against intruders, preventing
unauthorized access to or from the network. Firewalls can be implemented
using hardware, software, or a combination of both.
2.3 Intrusion Detection Systems
An Intrusion Detection System (IDS) is an additional protection measure that
helps ward off computer intrusions. IDS systems can be software and hardware
devices used to detect an attack. IDS products are used to monitor connection in
determining whether attacks are been launched. Some IDS
systems just monitor and alert of an attack, whereas others try to block the
attack.
2.4 Anti‐Malware Software and Scanners
Viruses, worms, and Trojan horses fall under the category of malicious
software, known as malware. Anti-malware tools are utilized to detect and
remedy infections within systems.
2.5 Secure Socket Layer (SSL)
The Secure Socket Layer (SSL) is a set of protocols widely used to establish a
secure connection between a web browser and a website. It creates a secure
channel or tunnel, ensuring that any information exchanged between the browser
and server remains protected. SSL includes authentication of clients to servers
through certificates, where clients present a certificate to prove their identity to
the server.
DESIGN PRINCIPLE:
The design principles for network security protection systems should adhere to
several key principles:
1. Least Privilege Principle: Objects within the system should only possess
privileges necessary to complete their tasks, minimizing exposure to potential
attacks and reducing invasion-related losses.
2. Defense in Depth Principle: Implement a multi-layered security system to
prevent any single point from becoming a vulnerability in the network.
3. Blocking Point Principle: Establish safety control points within the
interconnected network, acting as "choke points" for simplified security
management, network monitoring, and auditing.
4. Weakest Link Principle: Strengthen the weakest links in the security protection
chain to maintain overall system strength and balance.
5. Failure Protection State Principle: Ensure that the network security protection
system operates in a "fail-safe" mode, such that any failures or collapses will block
internal network access to maintain security.
6. Default Declined to State Principle: Default to a denied state from a security
standpoint to enhance failure protection.
FUTURE TRENDS IN SECURITY:
The future of Internet security is likely to be driven primarily by applications, with
a potential shift towards a security model akin to an immune system, capable of
fighting off attacks and adapting to confront increasingly sophisticated threats.
Although the trend towards biometrics could have emerged earlier, it appears to be
less actively pursued. Many current security developments are iterative, focusing
on refining existing technologies rather than radically new approaches.
CONCLUSION:
The field of network information security is constantly evolving, requiring a
comprehensive approach to protection. Relying solely on individual protective
measures does not guarantee security; instead, integrating various protection
strategies is essential. By leveraging the strengths of different measures and
fostering cooperation among them, a robust network information security
protection system can be established. Drawing from years of practical experience
in network security, the author highlights common hidden dangers and elaborates
on effective security strategies and principles for designing protection systems.
Continued vigilance in network security work is crucial for minimizing risks and
ensuring the network's normal operation.
REFERENCES:
• Dowd, P.W.; McHenry, J.T., "Network security: it's time to take it
seriously," Computer, vol.31, no.9, pp.24‐28, Sep 1998.
• B. Endicott .Active Defense to Cyber Attacks. Information Assurance and
Security [J].2014.9.
• “SecurityOverview,” www.redhat.com/docs/manuals/enterprise/RHEL‐4‐
Manual/security‐guide/ch‐sgs‐ov.html.
• A beginner’s guide to network security, CISCO Systems, found at
http://www.cisco.com/warp/public/cc/so/neso/sqso/ beggu_pl.pdf, 2001
• Anderson J P. Computer Security Threat Monitoring and Surveillance [P].
PA15034, USA. 2015.8.

Plagiarism Report

You might also like