Network Security Attacks and Countermeasures

Network Security Attacks and Countermeasures

Dileep Kumar G. (Adama Science and Technology University, Ethiopia), Manoj Kumar Singh (Adama Science and Technology University, Ethiopia) and M.K. Jayanthi (King Khalid University, Saudi Arabia)
Indexed In: SCOPUS
Release Date: January, 2016|Copyright: © 2016 |Pages: 357
DOI: 10.4018/978-1-4666-8761-5
ISBN13: 9781466687615|ISBN10: 1466687614|EISBN13: 9781466687622
Hardcover:
Available
$205.00
TOTAL SAVINGS: $205.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
(Multi-User License)
Available
$184.50
List Price: $205.00
10% Discount:-$20.50
TOTAL SAVINGS: $20.50
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
Hardcover +
E-Book:
(Multi-User License)
Available
$245.00
TOTAL SAVINGS: $245.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Description & Coverage
Description:

Our world is increasingly driven by sophisticated networks of advanced computing technology, and the basic operation of everyday society is becoming increasingly vulnerable to those networks’ shortcomings. The implementation and upkeep of a strong network defense is a substantial challenge, beset not only by economic disincentives, but also by an inherent logistical bias that grants advantage to attackers.

Network Security Attacks and Countermeasures discusses the security and optimization of computer networks for use in a variety of disciplines and fields. Touching on such matters as mobile and VPN security, IP spoofing, and intrusion detection, this edited collection emboldens the efforts of researchers, academics, and network administrators working in both the public and private sectors.

This edited compilation includes chapters covering topics such as attacks and countermeasures, mobile wireless networking, intrusion detection systems, next-generation firewalls, and more.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • DDoS Attacks
  • Intrusion Detection and Prevention
  • Network Administration
  • RSA Vulnerabilities
  • Threat Classification
  • Virtual Private Networks
  • VPN Security
  • Wireless Sensor Networks
Reviews and Testimonials

Computer and information scientists seek to increase evolutionary computation awareness in network security by providing a clear direction for monitoring, analyzing, and detecting network attacks. Among their topics are security issues in mobile wireless networks, a classification of network attacks and countermeasures of different attacks, cluster-based countermeasures for distributed denial of service attacks, countering RSA vulnerabilities and replacing it with an elliptic curve cryptographic scheme for key generation, and changing dynamics of network security involving hacking/cracking with next-generation firewalls.

– ProtoView Reviews
Table of Contents
Search this Book:
Reset
Editor/Author Biographies
Dileep Kumar G was born in 1982, in India. He has got B.Tech in Computer Science & Engineering and M.Tech in Software Engineering degrees from Jawaharlal Nehru Technology University, Hyderabad, India, in 2000 and in 2009. He is pursuing a PhD degree in Computer Science from Jawaharlal Nehru Technology University, Hyderabad, India. Currently he is an Assistant Professor in the Department of Computing, Adama Science and Technology University, Adama, Ethiopia. He has authored more than 20 publications in international journals, books chapters, and refereed international conference proceedings. He has also authored the book Data structures Through C++(ISBN: 978-81-8487-488-4, Narosa Publications,2015). His research interests include Network Security, Data Mining, Mobile Adhoc Networks, Grid Computing and Big Data. He is a Member of ACM and Life Member of ISTE and Senior Member of IEEE.
Manoj Kumar Singh is an Assistant Professor at the Department of Computing, School of Engineering, Adama Science & Technology, Adama, Ethiopia. His research areas are network security, data mining, data science, human-computer interaction, computing education, and software engineering. His research specifically focuses on software defects and how people and society discover, diagnose, repair and recover from them, spanning everyone from the people who use software to the people who develop it. Dr. Manoj Kumar Singh holds an M.Tech. and a Ph.D. in Computer Science & Engineering from India. He is the author of over 6 books, 52 peer-reviewed publications, and 8 receiving best paper awards.
M. K. Jayanthi is working as a University Professor in the Dept. of Computer Science in King Khalid University, Abha, Kingdom of Saudi Arabia and Quality Coordinator for both the Departments (CS & IS) – NCAAA – ABET Accreditation Process from Accreditation Board for Engineering and Technology (ABET), USA. She did B.E., (Computer Science and Engineering) in Adhiyamaan College of Engineering, Hosur, M.E., (Computer Science and Engineering) from Anna University, Chennai, M.S., (Software Systems) from Birla Institute of Technology and Science, BITS, Pilani, Rajasthan, Ph.D., in Computer Science and Engineering, from SCSVMV University, Kancheepuram and M.B.A., (Operations Management) from IGNOU., M.Phil. (Computer Science) from Madurai Kamaraj University & PGDPMIR., from Annamalai University. She has 18 years teaching experience in the Computer Science and Engineering Dept. in University level and guiding research scholars at Doctoral Level. Produced 2 Ph.D., Doctorates in Computer Science and Information Technology under her Guidance. She received VIT Research Award 2012-13 for Publishing 5 papers during the year 2012 in Scopus Indexed Research Journals. She guided 4 M.Phil., & 5 M.S., students. She has published more than 32 high quality research papers in refereed International Journals like World Scientific, IEEE Explore, and World Applied Sciences. She is JNTU - Annathapur ratified Principal of Engineering College and JNTU – Hyderabad ratified Professor of Computer Science and Engineering. She has Submitted an R&D PROJECT PROPOSAL Titled “e-Learning System Design using Mobile Agent based Learning Objects” to Ministry of Communications & Information Technology, Department of Information Technology.
Editorial Policy
In order to ensure the highest ethical practices are achieved for each book, IGI Global provides a full document of policies and guidelines that all editors, authors, and reviewers are expected to follow. View Full Editorial Policy
Peer Review Process
The peer review process is the driving force behind all IGI Global books and journals. All IGI Global reviewers maintain the highest ethical standards and each manuscript undergoes a rigorous double-blind peer review process, which is backed by our full membership to the Committee on Publication Ethics (COPE). The full publishing process and peer review are conducted within the IGI Global eEditorial Discovery® online submission system and on average takes 30 days. Learn More
Ethics & Malpractice
IGI Global affirms that ethical publication practices are critical to the successful development of knowledge. Therefore, it is the policy of IGI Global to maintain high ethical standards in all publications. These standards pertain to all books, journals, chapters, and articles accepted for publication. This is in accordance with standard scientific principles and IGI Global’s position as a source of scientific knowledge. Learn More
Abstracting & Indexing
Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.