Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Network Attacks

Handbook of Research on Securing Cloud-Based Databases with Biometric Applications
Whenever a hacker gets access to the network of computers without having privilege to access or execute any file or program. This type of attack by a hacker is known as network attack.
Published in Chapter:
Intrusion Detection and Prevention on Flow of Big Data Using Bacterial Foraging
Khaleel Ahmad (Maulana Azad National Urdu University, India), Gaurav Kumar (Swami Vivekananda Subharti University, India), Abdul Wahid (Maulana Azad National Urdu University, India), and Mudasir M. Kirmani (Sher-e-Kashmir University of Agricultural Science and Technology of Kashmir, India)
DOI: 10.4018/978-1-4666-6559-0.ch018
Abstract
Rapid connectivity and exchange of information across the globe with extension of computer networks during the past decade has led to security threats in network communication and has become a critical concern for network management. It is necessary to retain high security measures to ensure safe and trusted communication across the network. Diverse soft-computing-based methods have been devised in the past for the perfection of intrusion detection systems on host-based and host-independent systems. This chapter discusses the flow-based anomaly detector for intrusion in network by self-learning process with characteristics of bacterial forging approach. This approach handles the network-flow and attack on network traffic in an automated fashion. This approach works on host-independent systems and on stream of network rather than payload length where data behavior of flow in network is analyzed. This model provides a cataloging of attacks and resistance mechanism techniques to avoid intrusion.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
A Comparative Study on DNA-Based Cryptosystem
Network attacks are the methods like session hijacking, IP spoofing, denial of service, accessing the unintended data, etc., that exploit the vulnerabilities causing adverse effects in the network.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR