Reference Hub5
Framework for Threat Analysis and Attack Modelling of Network Security Protocols

Framework for Threat Analysis and Attack Modelling of Network Security Protocols

Nachiket Athavale, Shubham Deshpande, Vikash Chaudhary, Jatin Chavan, S. S. Barde
Copyright: © 2017 |Volume: 8 |Issue: 2 |Pages: 14
ISSN: 1947-9093|EISSN: 1947-9107|EISBN13: 9781522513384|DOI: 10.4018/IJSE.2017070105
Cite Article Cite Article

MLA

Athavale, Nachiket, et al. "Framework for Threat Analysis and Attack Modelling of Network Security Protocols." IJSE vol.8, no.2 2017: pp.62-75. http://doi.org/10.4018/IJSE.2017070105

APA

Athavale, N., Deshpande, S., Chaudhary, V., Chavan, J., & Barde, S. S. (2017). Framework for Threat Analysis and Attack Modelling of Network Security Protocols. International Journal of Synthetic Emotions (IJSE), 8(2), 62-75. http://doi.org/10.4018/IJSE.2017070105

Chicago

Athavale, Nachiket, et al. "Framework for Threat Analysis and Attack Modelling of Network Security Protocols," International Journal of Synthetic Emotions (IJSE) 8, no.2: 62-75. http://doi.org/10.4018/IJSE.2017070105

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Nowadays everything is computerized including banking and personal records. Also, to boost business profits, businessmen have changed their way of operations from physical way to electronic way, for example Flipkart. But as these developments benefit the developer they also increase the chance of exposing all of customer's personal details to malicious users. Hackers can enter into the system and can steal crucial or sensitive information about other authentic users and in case of banks leads to frauds. Security thus, becomes an important issue for all companies and banks. Intrusion detection systems help such companies by detecting in real time whether an intrusion is carried on or not. Here the authors are developing a signature based intrusion detection system which will scan incoming packets and send a warning message to system administrator. Also, the authors are implementing a framework and provide it to all the users so that developing intrusion detection based system similar to ours. The advantage of using framework is that it can be upgraded and re-defined whenever it is needed.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.