Framework for Threat Analysis and Attack Modelling of Network Security Protocols

Framework for Threat Analysis and Attack Modelling of Network Security Protocols

Nachiket Athavale (Kashibai Navale College of Engineering, Department of Computer Engineering, Pune, India), Shubham Deshpande (Kashibai Navale College of Engineering, Department of Computer Engineering, Pune, India), Vikash Chaudhary (Kashibai Navale College of Engineering, Department of Computer Engineering, Pune, India), Jatin Chavan (Kashibai Navale College of Engineering, Department of Computer Engineering, Pune, India) and S. S. Barde (Kashibai Navale College of Engineering, Department of Computer Engineering, Pune, India)
Copyright: © 2017 |Pages: 14
DOI: 10.4018/IJSE.2017070105
OnDemand PDF Download:
$37.50

Abstract

Nowadays everything is computerized including banking and personal records. Also, to boost business profits, businessmen have changed their way of operations from physical way to electronic way, for example Flipkart. But as these developments benefit the developer they also increase the chance of exposing all of customer's personal details to malicious users. Hackers can enter into the system and can steal crucial or sensitive information about other authentic users and in case of banks leads to frauds. Security thus, becomes an important issue for all companies and banks. Intrusion detection systems help such companies by detecting in real time whether an intrusion is carried on or not. Here the authors are developing a signature based intrusion detection system which will scan incoming packets and send a warning message to system administrator. Also, the authors are implementing a framework and provide it to all the users so that developing intrusion detection based system similar to ours. The advantage of using framework is that it can be upgraded and re-defined whenever it is needed.
Article Preview

Motivation

With advancements in the technology, most of the tasks that were supposed to be done by humans are now getting done by computers. Such evolution has begun a new era wherein everything is computerized including day-to-day tasks. To boost the performance organizations have changed their way of doing operations from physical way to digitization. Banking systems provides various ways with which a user can communicate with the bank from any remote location. User can transfer, deposit money with just a click.

Also, a user can access his confidential information from any location. However, this increases the chance of misusing the intellectual data by breaching the security by hackers. With technology evolutions, it becomes difficult to maintain user's intellectual information safe as it may be stored at remote locations. So, securing such remote storage from hackers becomes an ultimate goal for the organizations. Hackers or attackers can enter into the system and steal the information or can manipulate the sensitive data. Hackers make use of various techniques with which they can enter into the system illegally and achieve their goal. In sensitive areas like banking security is of great importance, because if someone hacks the net-banking passwords then he can do whatever with the account. Security thus becomes the most important issue in such sectors.

Developing a perfect secured system is not possible, because:

  • Most of the security systems have some limitations

  • Possibility abuses by privileged users inside the organization

  • Not all kinds of intrusions are known

  • A system cannot detect all types of attacks fully

Therefore, there must be a system which will be able to detect any kind of security breach and will ensure security. Quick detection of intrusion can save the intellectual data from being stolen and can alert the user if any hacker tries to attempt such intrusions.

Hence, the authors are developing an Intrusion Detection system which is capable of detecting any type of intrusion within short time and which alerts the user about the security breaches so that user can prevent any further data loss.

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 8: 2 Issues (2017)
Volume 7: 2 Issues (2016)
Volume 6: 2 Issues (2015)
Volume 5: 2 Issues (2014)
Volume 4: 2 Issues (2013)
Volume 3: 2 Issues (2012)
Volume 2: 2 Issues (2011)
Volume 1: 2 Issues (2010)
View Complete Journal Contents Listing