Framework for Threat Analysis and Attack Modelling of Network Security Protocols

Framework for Threat Analysis and Attack Modelling of Network Security Protocols

Nachiket Athavale, Shubham Deshpande, Vikash Chaudhary, Jatin Chavan, S. S. Barde
ISBN13: 9781522598664|ISBN10: 1522598669|EISBN13: 9781522598671
DOI: 10.4018/978-1-5225-9866-4.ch007
Cite Chapter Cite Chapter

MLA

Athavale, Nachiket, et al. "Framework for Threat Analysis and Attack Modelling of Network Security Protocols." Securing the Internet of Things: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2020, pp. 110-124. https://doi.org/10.4018/978-1-5225-9866-4.ch007

APA

Athavale, N., Deshpande, S., Chaudhary, V., Chavan, J., & Barde, S. S. (2020). Framework for Threat Analysis and Attack Modelling of Network Security Protocols. In I. Management Association (Ed.), Securing the Internet of Things: Concepts, Methodologies, Tools, and Applications (pp. 110-124). IGI Global. https://doi.org/10.4018/978-1-5225-9866-4.ch007

Chicago

Athavale, Nachiket, et al. "Framework for Threat Analysis and Attack Modelling of Network Security Protocols." In Securing the Internet of Things: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 110-124. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-5225-9866-4.ch007

Export Reference

Mendeley
Favorite

Abstract

Nowadays everything is computerized including banking and personal records. Also, to boost business profits, businessmen have changed their way of operations from physical way to electronic way, for example Flipkart. But as these developments benefit the developer they also increase the chance of exposing all of customer's personal details to malicious users. Hackers can enter into the system and can steal crucial or sensitive information about other authentic users and in case of banks leads to frauds. Security thus, becomes an important issue for all companies and banks. Intrusion detection systems help such companies by detecting in real time whether an intrusion is carried on or not. Here the authors are developing a signature based intrusion detection system which will scan incoming packets and send a warning message to system administrator. Also, the authors are implementing a framework and provide it to all the users so that developing intrusion detection based system similar to ours. The advantage of using framework is that it can be upgraded and re-defined whenever it is needed.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.