A Review On Network Security
A Review On Network Security
net/publication/326083990
CITATIONS READS
3 2,002
2 authors, including:
Rizwan Khan
Galgotias University
106 PUBLICATIONS 894 CITATIONS
SEE PROFILE
All content following this page was uploaded by Rizwan Khan on 04 July 2018.
Abstract— In Modern era Internet is expanding at a very fast pace, so as its security needs. Security is an important
concept because it contains certain rules, policies and provisions that are being adopted by a network admin to
prevent misuse of network accessible resources. It is necessary for both public and private network because there are
different type of work including transactions, business communications and government agencies. Network security
has become need to prevent information from various threats and viruses.
I. INTRODUCTION
Network Security has become a challenging task for the network service providers to prevent security related
threats. Today we are totally dependent on network or we are surrounded by internet to make our day to day work
easy.
But this poses a challenge for organisations as there information on network can be accessed by any remote
computer who are not permitted to access those resources.
Network security is basically used to protect data on the network and devices on the network. Both the term
network security and information security are used to derive the same meaning.
Availability:
Data must be available to the authorised user whenever required. It is the duty of the server to maintain its data
using certain tools and techniques so that it is available to end users.
Data can be made available by regular backup and redundancy methods.
Confidentiality:
It is a process of allowing authorised users to access protective data. For ex while performing bank transactions
only you and the authorised user of the bank should maintain your record, but no one else.
Failure in this lead to theft and leak of protected data.
A. WEP:
It is an older version of network security protocol. It is used before the WPA protocol and was available for
802.11a and 802.11b devices. WEP is encryption algorithm whose work is to setup network security key. This key
encrypts the information which is send on the network to remote devices.
B.WPA:
It is a newer version of the network security protocol. It is mandatory in the IPV6. The WPA encrypts
information and check whether the network security key is modified or not.
This is beneficial because it maintains authenticity. It is designed to work with most of the routing devices and
access points.
IV. PROBLEMS
As the internet is widely used medium to access and transfer information. There are various threats associated
with it, It is the responsibility of the network administrator to protect the websites and there data from these malicious
attackers.
There are two categories of attacks:
a. Active attacks
b. Passive attacks
a. Active attacks: Active attacks are those in which hacker or attacker attempts to make changes in the data over
the network. Active attacks include:
1. Pretence of someone’s identity as their own identity.
2. Modification in the transmitted message.
3. Replay of the previous message.
4. Denial of service attack.
b. Passive attacks: Passive attacks are those attacks in which communication or system is monitored. This can
be done by many ways including reading emails, tracking online activities or using another system microphone or camera
for spying. It looks less harmful but if information is any sensitive content than it is the most harmful one.
Passive attack include:
1. Monitoring the flow of traffic
2. Obtaining the contents of the message.
3. Eavesdropping.
V. COUNTERMEASURES
Network Security has become a challenging task for the network service providers to prevent security related
threats. Today we are totally dependent on network or we are surrounded by internet to make our day to day work easy.
But this poses a challenge for organisations as there information on network can be accessed by any remote
computer who are not permitted to access those resources.
Network security is basically used to protect data on the network and devices on the network. Both the term
network security and information security are used to derive the same meaning. If there is an attack we do have a
countermeasure for that for ex if someone is trying to find a path in the network for that we use Firewall to protect our
network. For the problem of buffer overflows we have Intrusion Detection system, for Denial of Service attack we have
Ingress Filtering and IDS.
Figure2: Firewall
C. IPsec:
It is mandatory in IPV6 but was optional in IPV4. It is highly modular and allow user to select from various
cryptographic algorithms and protocols. It protects from narrow stream and wide stream.
VI. CONCLUSION
Network Security is an important concept that is gaining attention as more and more internet usage is increasing.
The security threats and various protocols were analysed to maintain the network security. When an attack become
sophisticated so does the technology becomes. Today biggest challenge is enforcing policies against these threats.
REFERENCES
[1] Carle E. Landwehr, “Security Issues in Networks with Internet Access”, Member, IEEE.
[2] http://whatis.techtarget.com/definition/Confidentiality-integrityand-availability-CIA
[3] Cryptography and network security: principles and practice, Second edition by William Stallings.
[4] Fundamentals of computer security technology by Edward G. Amoroso.